US Police Real-Time Mapping Of Terrorist Attacks

A new technology will help police officers be at the touch of their cell phones to supply them better response at scenes of terrorism and other scenes of mass casualties where good communication and the quick deployment of officers is critical.  

The technology supplies a real-time mapping capability to first responders dealing with active shooting attacks.

According to nj.com, the development is based on a system used by the US Navy SEALS in 2011, the program allows all those responding to a critical incident to “see” and communicate with each other using just their smartphones.

New Jersey Ocean County Prosecutor’s office demonstrated the technology, which Prosecutor Joseph Coronato envisions would be adopted by local school districts and then spread to other potential terrorist targets.

“With this technology, law enforcement responding to a school threat will for the first time literally be on the same page and have a complete picture of on-scene personnel,” Coronato said.

For a price tag of between $25,000 and $50,000, the prosecutor’s office bought a cloud-based secure server that will store the floor plans of schools and any other buildings or sites that could be potential terrorist targets.

The app gives police and school personnel access to those mapped plans and shows in real time the names and locations, updated every 5 seconds, of the officers on scene.

It also allows emergency responders to know where their fellow officers are, reducing the chances of a friendly-fire incident. It can also help get to victims more quickly when they can “see” if the law enforcement activity has moved away from a particular area, making it safe to get to the injured person, Coronato said.

The prosecutor’s office recently held a demonstration of the program at Central Regional High School for a dozen police agencies, including the New Jersey State Police. So far, six school districts in Ocean County are participating and two others are in the start-up phase, he said.

The sprawling high school in Berkeley, with its various hallways and more than four dozen separate entrances, highlighted the confusion law enforcement officers could face when arriving at an unfamiliar building.

As part of the training, Berkeley police officers participated in two drills, one simulating a school emergency with two victims and another with one injured and one dead.

Coronado said the SWAT team has already used the technology for a suspect who barricaded himself in his house. His office is also planning to use it for an upcoming charity. Held last year, the run in Seaside Park, was the site of a bombing, allegedly by a man who’s accused of also planting bombs in New York City and Elizabeth on the same day last year.

I-HLS

You Might Also Read: 

Wearable Sensor Tech For Beat Police Officers:

Fighting Digital Crime: Evolving Police Methods:

 

« IT Jobs Are Bound For Extinction
Dragonfly Threat: Hackers Will Sabotage Power Grids »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

Cirosec

Cirosec

Cirosec is a specialized company with a focus on information security. We carry out pentests & audits and advise our customers in the German-speaking countries on information and IT security issues.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

Gotham Security

Gotham Security

Gotham Security delivers high-quality penetration testing, malicious adversary simulation, compliance program development, and threat intelligence services.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.