US Police Real-Time Mapping Of Terrorist Attacks

A new technology will help police officers be at the touch of their cell phones to supply them better response at scenes of terrorism and other scenes of mass casualties where good communication and the quick deployment of officers is critical.  

The technology supplies a real-time mapping capability to first responders dealing with active shooting attacks.

According to nj.com, the development is based on a system used by the US Navy SEALS in 2011, the program allows all those responding to a critical incident to “see” and communicate with each other using just their smartphones.

New Jersey Ocean County Prosecutor’s office demonstrated the technology, which Prosecutor Joseph Coronato envisions would be adopted by local school districts and then spread to other potential terrorist targets.

“With this technology, law enforcement responding to a school threat will for the first time literally be on the same page and have a complete picture of on-scene personnel,” Coronato said.

For a price tag of between $25,000 and $50,000, the prosecutor’s office bought a cloud-based secure server that will store the floor plans of schools and any other buildings or sites that could be potential terrorist targets.

The app gives police and school personnel access to those mapped plans and shows in real time the names and locations, updated every 5 seconds, of the officers on scene.

It also allows emergency responders to know where their fellow officers are, reducing the chances of a friendly-fire incident. It can also help get to victims more quickly when they can “see” if the law enforcement activity has moved away from a particular area, making it safe to get to the injured person, Coronato said.

The prosecutor’s office recently held a demonstration of the program at Central Regional High School for a dozen police agencies, including the New Jersey State Police. So far, six school districts in Ocean County are participating and two others are in the start-up phase, he said.

The sprawling high school in Berkeley, with its various hallways and more than four dozen separate entrances, highlighted the confusion law enforcement officers could face when arriving at an unfamiliar building.

As part of the training, Berkeley police officers participated in two drills, one simulating a school emergency with two victims and another with one injured and one dead.

Coronado said the SWAT team has already used the technology for a suspect who barricaded himself in his house. His office is also planning to use it for an upcoming charity. Held last year, the run in Seaside Park, was the site of a bombing, allegedly by a man who’s accused of also planting bombs in New York City and Elizabeth on the same day last year.

I-HLS

You Might Also Read: 

Wearable Sensor Tech For Beat Police Officers:

Fighting Digital Crime: Evolving Police Methods:

 

« IT Jobs Are Bound For Extinction
Dragonfly Threat: Hackers Will Sabotage Power Grids »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cybereason

Cybereason

Cybereason provides attack protection with cutting edge EDR and XDR, and industry recognized consulting services to support organizations throughout any stage of the incident lifecycle.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

Yellow Brand Protection

Yellow Brand Protection

Yellow Brand Protection operates 24/7 to protect brands' Intellectual Property (IP) from infringements on all kinds of online distribution channels.

White Bullet

White Bullet

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Dazz

Dazz

Dazz is the cloud security remediation platform for smart security and development teams.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Praxis Security Labs

Praxis Security Labs

Praxis Security Labs is a research driven cybersecurity company that helps our customers to reduce risk and improve security.

DeviQA

DeviQA

DeviQA provide best-in-class quality assurance services to companies of all sizes.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

Invisinet Technologies

Invisinet Technologies

Invisinet is a cybersecurity technology company specializing in innovative solutions that protect network infrastructure and critical assets from advanced threats.