GIS Plays Key Role in Homeland Security
'Smart' digital mapping databases springing up throughout states
Computerworld - The war against terrorism is being fought on many fronts and in many parts of the world. And at the state and local levels in the U.S., the war is being waged at least partially in cyberspace with the help of geographic information systems (GIS) technology.
The city of Boston, for example, has initiated a pilot project called the Boston Preparedness Pilot that is tapping into the digital mapping and smart database expertise of the National Imagery and Mapping Agency (NIMA). The Boston pilot stems from a larger nationwide program known as the 120 Cities Project, the goal of which is to disseminate what Anita Cohen, director of homeland security at NIMA, calls "a minimum level of geospatial preparedness" down to state and local emergency responders.
Carl Walter, deputy director of the Boston Police Department's Office of Research and Evaluation, heads the Boston Preparedness Pilot. He characterized the IT-based initiative as crucial to helping the department "come up with critical-infrastructure data that will help us respond to attacks and in our day-to-day policing activities."
City police officials acquired 100 digital mapping files of the entire Boston area from NIMA, including 6-in.-resolution imagery that details the locations of every school, grocery store, hospital, police station, government building, industrial facility and prominent landmark. "We have every piece of information about water [systems] you can possibly imagine," Walter said. "We also have information on every bridge in the city of Boston," as well as data on all major highways, roads and parking lots, he said.
However, the data from NIMA isn't simply a collection of flat files. "It's smart data," said Cohen. In fact, the digital mapping software allows officials to click on any installation depicted on their maps and pull up a wealth of data about the structure. For example, in seconds, emergency planners can determine how many beds are available in a given hospital or how many employees might be in an office building on any given day. They also have access to critical engineering data on bridges, sports stadiums and other large public structures.
"Buildings are a fundamental data layer for critical-infrastructure protection," Walter said.
More important from an antiterrorism perspective, Boston and other cities are taking advantage of a software package known as the Consequence Application Toolset, developed by the Defense Threat Reduction Agency and Science Applications International Corp. in San Diego. The software enables planners to quickly analyze a chemical, biological or nuclear explosion and determine in a matter of seconds what geographic area and how many buildings and people are immediately threatened. It also integrates real-time weather data to help determine how and in which direction the toxic plume will spread.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts