ESInets and security – A hypothetical scenario using NG9-1-1 to combat terror
As I mentioned in my last blog, we are moving to the era of smart and connected cities, but to reach this plateau we must first have a safe city. That’s what NG9-1-1 will do: an ESInet can become a city’s backbone for connecting all citizen services, agencies and devices. If this network supports intelligent devices, why not use it to turn the tables on criminals and use technology to protect and serve before a crime is committed? NG9-1-1 provides a blueprint that allows agencies to “connect the dots” to provide faster, more predictive emergency response.
Now, let’s look at a hypothetical scenario using NG9-1-1 to combat terrorism. The following scenario is based on a fictitious city (named as Cityville) and attack, and is designed to exhibit the possibilities technology can offer to city officials and First Responders.
Truck Rental company provides connection to the Department of Motor Vehicles, Credit Card firms and Law Enforcement so as to share renter information, protecting against credit card theft (real-time) and wanted individuals (criminal or terror). By way of a secure data exchange system, the rental company is able to share pertinent data with agencies and, in turn, receive secure updates and/or warnings such as recent thefts or abductions. Each rental store is subsequently outfitted with cameras which can share footage; the rental company can then elect to share real-time security feeds with respective local law enforcement agencies. The rental’s Fleet Management has GPS tracking on all rental vehicles for theft prevention.
|1:45:00 pm:||Suspect rents truck, provides driver’s license, clerk enters driver’s license number into their Fleet Management rental system.|
|1:46:34 -||Driver’s license triggers alert from DMV, which is linked to NCIC and FBI watch list. Individual is known to agencies as extremist, resides in city 80 miles away. Analytics show individual, by way of cellular records, has had unusual amount of international calls to known ISIS sympathizers. Real-time analytics platform (powered by quantum supercomputer at state data center) runs query of individual’s internet search history, revealing key word search “downtown Cityville”, “veteran’s memorial”, “truck rental” and “best routes out of Cityville”. Additional internet history reveals 30% of individual’s online time spent on radical Islamic websites, with 25% increase in last 7 days.|
|1:47:12 -||Situation profile based on data accessed via state, DOJ, FBI and data center sources via regional ESInet secure interconnections determines 81% probability of “Suspicious Incident Underway – Downtown Cityville”.|
|1:47:18 –||The rental’s Fleet Management receives notice of alert, request of “Please Send Camera Feed from specific store rental vehicle counter. Include vehicle number and GPS transponder number”. Rental company are not aware of situation unfolding, does not need to be as employees do not need to risk their well-being.|
|1:47:24 -||Data sent, delivered to state data center.|
|1:47:30 -||Analytics trigger prospective “High Risk Situation” alert to Cityville Police Department, Cityville Transit Authority and State Park System that “Vehicle Rental by Known Suspect Underway; Suspicious Incident Unfolding”.|
|1:48:30 –||Cityville dispatch relays alert to all officers in Cityville within 4 block radius of Veteran’s Memorial using geo-fence, includes Transit, Park officials and Capital Police personnel in area.|
|2:14:45 –||McKenzie Street Bridge entry – License plate reader detects suspect vehicle entering bridge. Alert sent to Transit Authority command center, shared via Cityville Regional ESInet to Cityville Police dispatch. Dispatch issues updated alert on vehicle status.|
|2:19:12 –||Streetlight camera at Stephens and Grape Street detects suspect vehicle heading northbound. Incident data transmitted via Cityville Regional ESInet to Cityville Police dispatch.|
|2:25:31 –||Camera on light pole at Adams and Jefferson Street Avenue detects suspect vehicle maintaining northbound heading. Data update sent via Cityville Regional ESInet. Cityville Police dispatch sends updated alert to all units with “Suspect vehicle heading northbound towards Capitol area and Veteran’s Memorial; units are to engage; establish perimeter fence at Washington Street between Adams and Montgomery.|
|2:27:40 –||Streetlight camera at Adams and Ford Streets detects suspect vehicle on adjusted northbound heading; Cityville Police receives data via ESInet; predictive analytics via data center Quantum AI computer (using original threat feed) determines “High Probability of Crime/Attack Underway”.|
|2:28:55 –||Cityville Police dispatch sends updated alert “Possible Attack Unfolding; Detain Vehicle Immediately”.|
|2:33:34 –||Cityville Police vehicle following suspect vehicle engages; suspect vehicle does not stop.|
|2:34:08 –||Cityville Police vehicle proceeding westbound on Lincoln Avenue ordered to engage and block northbound traffic on Adams. Cityville Police issues request to Cityville Transit Authority to turn eastbound traffic signals to “Red” on Douglas and Stephenson streets between Adams and Montgomery.|
|2:35:00 –||Cityville Transit Authority executes red light change; real-time data feed shared via ESInet|
|2:36:12 –||Suspect vehicle approaches Douglas. Traffic backed up to intersection. Back up units on scene blocking southbound lanes. Suspect vehicle stopped.|
|2:53:00 –||Suspect surrenders after realizing no way out.|
|2:55:33 –||Cityville Police discover suicide note on suspect; suspect confirms intention to engage in vehicle attack|
|7:00:00 –||Veteran’s Day Memorial holiday ceremony proceeds as planned|
The above scenario, when viewed in this context, does not seem out of the realm of possibilities nor is it above and beyond standard policing protocols. When introducing the use of interconnected data sources, analytics and converged communications in this fashion, this is part and parcel to what NG9-1-1 provides any city when fully deployed. As such, when aligning what NG9-1-1 offers in the way of data delivery, the ESInet that serves as the secure network for public safety and leveraging the data that is collected by state and federal sources, one can see how public safety would be the securing homeland force. We must look to what already exists, embrace it and realize that the most powerful tool one can put to work to fight terror is technology.