GIS Plays Key Role in Homeland Security
'Smart' digital mapping databases springing up throughout states
Computerworld - The war against terrorism is being fought on many fronts and in many parts of the world. And at the state and local levels in the U.S., the war is being waged at least partially in cyberspace with the help of geographic information systems (GIS) technology.
The city of Boston, for example, has initiated a pilot project called the Boston Preparedness Pilot that is tapping into the digital mapping and smart database expertise of the National Imagery and Mapping Agency (NIMA). The Boston pilot stems from a larger nationwide program known as the 120 Cities Project, the goal of which is to disseminate what Anita Cohen, director of homeland security at NIMA, calls "a minimum level of geospatial preparedness" down to state and local emergency responders.
Carl Walter, deputy director of the Boston Police Department's Office of Research and Evaluation, heads the Boston Preparedness Pilot. He characterized the IT-based initiative as crucial to helping the department "come up with critical-infrastructure data that will help us respond to attacks and in our day-to-day policing activities."
City police officials acquired 100 digital mapping files of the entire Boston area from NIMA, including 6-in.-resolution imagery that details the locations of every school, grocery store, hospital, police station, government building, industrial facility and prominent landmark. "We have every piece of information about water [systems] you can possibly imagine," Walter said. "We also have information on every bridge in the city of Boston," as well as data on all major highways, roads and parking lots, he said.
However, the data from NIMA isn't simply a collection of flat files. "It's smart data," said Cohen. In fact, the digital mapping software allows officials to click on any installation depicted on their maps and pull up a wealth of data about the structure. For example, in seconds, emergency planners can determine how many beds are available in a given hospital or how many employees might be in an office building on any given day. They also have access to critical engineering data on bridges, sports stadiums and other large public structures.
"Buildings are a fundamental data layer for critical-infrastructure protection," Walter said.
More important from an antiterrorism perspective, Boston and other cities are taking advantage of a software package known as the Consequence Application Toolset, developed by the Defense Threat Reduction Agency and Science Applications International Corp. in San Diego. The software enables planners to quickly analyze a chemical, biological or nuclear explosion and determine in a matter of seconds what geographic area and how many buildings and people are immediately threatened. It also integrates real-time weather data to help determine how and in which direction the toxic plume will spread.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts