SlideShare ist ein Scribd-Unternehmen logo
1 von 76
CCTNS & Homeland Security
A Geospatial Perspective
Sanjay Sahay,
ADGP, Police Computer Wing,
Bangalore
Crime & Criminal Tracking &
Network Systems
About the Program
• Mission Mode Project under the National
e-Governance Plan of Govt. of India
• IT-enabled-state-of-the-art tracking
system around 'Investigation of crime and
detection of criminals'
• An allocation of Rs. 2000 Crores has been
made for CCTNS Project.
• Cabinet Committee on Economic Affairs
(CCEA) has approved the project on
19.06.2009.
Coverage
Approx. 14,000 Police
Stations throughout the
country
6000 higher offices in
police hierarchy
Circles, Sub-Divisions,
Districts, Range, Zones,
Police Headquarters, SCRB
Objective
Citizen friendly and more transparent Police functioning
Delivery of citizen-centric services through effective usage of ICT
Provide tools, technology and information to facilitate investigation of crime and
detection of criminals
Improve Police functioning areas such as Law and Order, Traffic Management etc.
Facilitate Interaction and sharing of Information among Police units
Assist senior Police Officers in better management of Police Force
Keep track of the progress of Cases, including in Courts
A FULLY FUNCTIONAL
NATIONAL DATABASE
Scope of Project
CCTNSData Centre /
DRC
Site
Preparation /
Infrastructure
Software
Enhancements
Capacity
Building
Data
Digitization
Scope of Project
SIData Centre /
DRC
Site
Preparation /
Infrastructure
Software
Enhancements
Capacity
Building
Data
Digitization
Police IT - CCTNS
• GoI accepted
Karnataka as
Lead State
• Both the
Projects get
integrated
• Mission
Mode Project
• Wipro, the
Developer
Police IT CCTNS
Lead
State
CCTNS
Police IT
Core Infrastructure - Karnataka
Software Scope
Core
Application
Software
Registration,
Investigation
&
Prosecution
Traffic
Citizen
Portal
Integration
Crime
Search and
Analysis
Law and
Order
Other Components
Infrastructure
• Client Site Infra
• Data Center
• DR Center
• Connectivity
Training
• Basic IT
• Role Based
• System Admin
Data
Digitization
• Crime Data
Digitization
• Data Migration
Advanced Solutions
CCTNS - II
Crime
Analytics
Mobile Data
Terminal
CAD based
PCR
AVLS
Traffic
Magt.
System
Business
Intelligence
Karnataka CCTNS - Update
Pending
Change Management
Program
Train The Trainer
ISO Policy
On-going
CAS-Gap Development
Citizen Portal
Center-State Integration
DR Center Set up
Completed
Site Preparation
Client Site Infrastructure
Data Center ( except SSO/SLB)
Police IT Enhancements
Center – State Integration
Karnataka
Crime DB
National Crime
DB
State-
1
State-
2
State-
3
State-
4
2-way data transfer
All Police Stations have all
relevant maps on display
Sand models have been a part of
standard training
The Map of today is the
Geospatial Information as the requirements are
much more complex yet precise, the demand
for which is dictated by ground realities.
Herein lies the need for Geospatial Information
Geospatial Technology ought to
be at the base of CCTNS
Google Earth
Google Maps
Mapmyindia
From Crime Analysis to
Homeland Security: A Role for
Neighborhood Profiling?
From Crime Analysis to Homeland Security
The Vulnerable Localities Index for Sandwell
in the West Midlands region of England. A
score of 100 is representative of the study
area’s average measure. Values greater than
100 indicate higher measures of vulnerability.
Areas with the highest VLI scores are those
that should receive focused neighbourhood
policing attention (Chainey 2004)
Distribution of postcodes with conflict-
related deaths in Belfast (1970–2004).
Peacelines are labeled
Schematic of spatial characteristics of Critical Risk Zones according to Olivares and Maghelal (2005)
Internal Security for Communities
Location of City of Bryan and Brazos County, Texas
Internal Security for Communities
Geo-coded addresses of reported sex crimes and suspected offenders
Proximity of perpetrators’ dwelling to location of crime they perpetrated than the designated buffers
creating child safe zones (Fig. 6.11), indicating the CSZs offer little impact as a preventative measure.
Map to show the 2,000 feet proposed buffer around premises where children congregate
including school bus stops
CCTNS – the road ahead
Geospatial Preparedness
The power of Processing
Appropriate
Geospatial Assets
Imagery/data as
required
Processing
CCTNS- the road ahead
Geospatial Preparedness
The power of Processing
Inputs as per software
requirements
Appropriate Software
Actionable Output
CCTNS – the road ahead
Geospatial Preparedness
The power of Processing
The human expertise
Standard Communications &
Operations
The data/the SP/the Ops
Commander all on the same
page, real time
Homeland Security
A Robust Counter Terrorism Mechanism
Watershed in Modern
Human History
Homeland Security
A Robust Counter Terrorism Mechanism
The attack on the World Trade Center in 2001 has
been by far the single most important event in the
history of the modern world and more so because it
forced the world to change its perception on the
nature of organization, the usage of technology,
the responses, the consolidation of activities and
spread of mechanisms needed to thwart the ever
growing terrorism the world over.
Mega City
Policing Project
Mega City Policing Project
Criticality of mega cities as economic
growth engines
Formidable beginning for war against terrorism
Connecting the cities would lead to a
national network
Returning to normalcy insurmountable
Leveraging Technology for HLS
Gaping holes in technology
Functionalities cannot be achieved when basic
issues related to execution, back end
processes and its robustness is still in
question
Need of the hour: identification of
technological platforms as first foundation
stones of HLS in India
Technological Framework
Command and Control Centre (CCC)
Interception Systems (IS)
City Based Video Surveillance System
(CBVSS)
Command and Control Center (CCC)
Integrating all fields – radio, audio,
video, text, data, images and graphics
Through a viable command and control
center software
Creation of a state of the art C4i
Interception Systems( IC)
Capability to monitor and penetrate
any mode of communication/storage
Connect to HLS specific
requirements
Analyse on a real time basis
Up-gradation and Scalability inbuilt
City Based Video Surveillance
System (CBVSS)
Proven track record of providing best
possible information ( video footage )
Ajmal Kasab
Technologically way ahead of CCTV networks
Inbuilt video analytics provides the connects
Integrated system. Deterrent and a must!!!
Technological Framework
TETRA Radio Network (TRN)
Geospatial Technology for HLS (GTHLS)
ERP Solution, RDBMS and Integration
(ERI)
TETRA Radio Network (TRN)
 TETRA – A Public Safety Network
 Fully digital mode
 Complete integration of all communication
gadgets
 Delivery of high quality voice/data/other
outputs
TETRA eludes India
Geospatial Technology for HLS
 Conventional inputs are unable to
provided actionable data
 Map of today is Geospatial imagery/GIS
 Third Eye
 Critical for planning, preparation &
response
Geospatial Technology for HLS
 Supports incident management
 Great tool for regulation, enforcement,
monitoring and supervision
Geospatial Technology for HLS
 detection, preparedness, prevention,
protection, rescue, relief, recovery, and
reconstruction
 accurate geospatial information in order
to accomplish many of the tasks during an
emergency response situation
 tighter coupling between geospatial
technologies and homeland security
missions
Geographic Information Science
 addresses the fundamental issues behind
spatial data handling efforts, such as
spatial data representation, analysis,
modeling, and visualization
BlackandwhiteLandsatimagemosaicofAfghanistan(Shroder,1977)
Part of the Kabul and Pansher
landsat mosaic (1:500,000 scale)
printed by the CIA
during the Soviet-Afghan War
showing the area between Salang
Pass, Baghram Air Base, and
Kabul
Remote Sensing and GIS as Counterterrorism Tools for Homeland Security
Example of the legend of part of the Kabul III
sheet at 1:500,000 scale of the Landsat
mosaic in false color made by the CIA in the
early 1980s, with gazetteer information on the
back
Part of the Kabul III sheet showing Kabul in the upper left, the Spin Ghar (Safed Koh) range, the Parachinar (‘parrot’s
beak’) border reentrant of the Kurram Agency part of the Northwest Frontier Province of Pakistan into which bin Laden
escaped, and the many enumerated passes along the border that are used for smuggling people, drugs, and weapons
Example spatial subset of 8
September 2005 AVIRIS scene
acquired over the New Orleans
vicinity, LA, USA. Shown is band 42
(739.35 nm). The area in the upper
right portion of the scene is
submerged by Hurricane Katrina-
induced floodwaters
Economic Impacts of Terrorist
Attacks and Natural Disasters
Total losses of jobs from the
hypothetical hurricane event
Isometric view of a hyperspectral
AVIRIS image cube, New Orleans
area, LA, USA, with bands 42 (739.35
nm), 30 (645.58 nm), and 18 (529.81
nm) as R, G, B for the top-plane
image, converted to grayscale. The
scene was acquired on 8 September
2005 with a pixel size of ∼9.7 m. The
image cube displays, in the z-
dimension, 224 spectral channels on
the 370–2500-nm wavelength interval
Poppy and Terrorism
Poppy and Terrorism
Remote Sensing-Based
Damage Assessment
for Homeland Security
Pre- and post-Hurricane Katrina IKONOS satellite images of a portion of New Orleans, LA, USA, acquired on 28 August 2002
(left) and 2 September 2005 (right), respectively (truecolor, converted to grayscale). Building damage and flooded areas are
readily apparent in the post-hurricane image on the right. Such outwardly apparent structural damage can be visually
interpreted by a human analyst.
Agent-Based Modeling and
Evacuation Planning
Human and Geophysical
What if scenarios
Agent Based modelling takes care
of this and also the simulation process
 Evacuation Planning remains to be a challenging
task
Traffic situations at different times during a simulated
evacuation: One and half hours into the evacuation
Security Audit
•Where it all starts….
Evacuation Plan
•For a safer end!
Geospatial all the way!
Agent-Based Modeling and
Evacuation Planning
Human and Geophysical
What if scenarios
Agent Based modelling takes care
of this and also the simulation process
 Evacuation Planning remains to be a challenging
task
Building Evacuation in
Emergencies
 Surge of interest in this field now
developing building evacuation analysis using
models that focus explicitly upon the human
individual’s locus of behavior
 Large number of softwares available for modelling
and simulating pedestrian evacuation from
enclosed spaces
Spatial Epidemiology:
Where Have We Come
in 150 Years?
We have a well proven precedent!
The Role of Geosurveillance and
Security in the Politics of Fear
Motive agnostic!
The Importance of
Spatial Thinking in
an Uncertain World
Geospatial
education and R & D
is the key
Three characteristics distinguish homeland
security applications from other domains:
the need for speed; the difficult
environments in which technology must
operate; and the impossibility of anticipating
many relevant kinds of events in either space
or time.
The challenge!
ERP, RDBMS & Integration
 Complete functioning of the department
on ERP
 To be populated in a real time and dynamic
mode
 RDBMS
 Integration of the legacy systems
 On single sign in / sign off concept
Managerial
Response to War on
Terror
Managerial Response to War
on Terror
HUGE GAPS in learning, skills and attitudes of
internal security managers
Human resources should outmatch the technical
system
Utility is how best we utilize
Innovative methods inclusive of outbound
learning
Change management is the most critical
component
National Homeland Security
Resource Base & Incident Support System
Differential levels of technologies &
differential levels of mental frames
Executed at the division level in a city / then
seven cities integrated at the national level
Six technologies having their national
control centers at any location
Six of the these control centers gets
integrated into NHLSRB - ISS
Integration
National Homeland Security – Resource Base
and
Incident Support System (NHLS – RBISS)
National Homeland Security
Blueprint
The beginning of this grandiose plan set to have
a transformational impact on the Homeland
Security scenario of the country is yet to be
made. The world’s best buildings were a blueprint one
day. A blueprint is the first to crystallize our
thoughts, it could take a large number of revisions,
nonetheless it has to start. Time seems to be
running out.
Overall Framework
CCTNS & Homeland Security

Weitere ähnliche Inhalte

Andere mochten auch

Crime and Criminal Tracking Network Systems (CCTNS)
Crime and Criminal Tracking Network Systems (CCTNS)Crime and Criminal Tracking Network Systems (CCTNS)
Crime and Criminal Tracking Network Systems (CCTNS)Rahul Singla
 
Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsOsokop
 
Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record itVideoIQ
 
Open Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist AttackOpen Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist AttackSeven Questions Consulting Limited
 
As armas "artesanais" da guerra na Síria
As armas "artesanais" da guerra na SíriaAs armas "artesanais" da guerra na Síria
As armas "artesanais" da guerra na SíriaPLETZ.com -
 
vbied-attack-at-voodkhel-september-2006
vbied-attack-at-voodkhel-september-2006vbied-attack-at-voodkhel-september-2006
vbied-attack-at-voodkhel-september-2006Agha A
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPace IT at Edmonds Community College
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...Cybersecurity Education and Research Centre
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
Journal of Physical Security 8(1)
Journal of Physical Security 8(1)Journal of Physical Security 8(1)
Journal of Physical Security 8(1)Roger Johnston
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesChamath Sajeewa
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentationIISPEastMids
 

Andere mochten auch (20)

CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
CCTNS
CCTNS CCTNS
CCTNS
 
Crime and Criminal Tracking Network Systems (CCTNS)
Crime and Criminal Tracking Network Systems (CCTNS)Crime and Criminal Tracking Network Systems (CCTNS)
Crime and Criminal Tracking Network Systems (CCTNS)
 
Karnataka State Police RFP Volume 1
Karnataka State Police RFP Volume 1Karnataka State Police RFP Volume 1
Karnataka State Police RFP Volume 1
 
Fundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis ConceptsFundamentalsof Crime Mapping Tactical Analysis Concepts
Fundamentalsof Crime Mapping Tactical Analysis Concepts
 
Prevent the crime, don't just record it
Prevent the crime, don't just record itPrevent the crime, don't just record it
Prevent the crime, don't just record it
 
Intro terrorism
Intro terrorismIntro terrorism
Intro terrorism
 
Open Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist AttackOpen Source Analysis of the In Amenas, Algeria Terrorist Attack
Open Source Analysis of the In Amenas, Algeria Terrorist Attack
 
As armas "artesanais" da guerra na Síria
As armas "artesanais" da guerra na SíriaAs armas "artesanais" da guerra na Síria
As armas "artesanais" da guerra na Síria
 
vbied-attack-at-voodkhel-september-2006
vbied-attack-at-voodkhel-september-2006vbied-attack-at-voodkhel-september-2006
vbied-attack-at-voodkhel-september-2006
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
The New Security - Post "9/11"
The New Security - Post "9/11"The New Security - Post "9/11"
The New Security - Post "9/11"
 
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
National Critical Information Infrastructure Protection Centre (NCIIPC): Role...
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
Journal of Physical Security 8(1)
Journal of Physical Security 8(1)Journal of Physical Security 8(1)
Journal of Physical Security 8(1)
 
2016 07-19 ctp update and assessment
2016 07-19 ctp update and assessment2016 07-19 ctp update and assessment
2016 07-19 ctp update and assessment
 
Exploring ISIS in Yemen
Exploring ISIS in YemenExploring ISIS in Yemen
Exploring ISIS in Yemen
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentation
 

Ähnlich wie CCTNS & Homeland Security

Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Ageglobal
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Papermartindudziak
 
Integrating spatial and thematic data: the CRISOLA case for Malta and the Eur...
Integrating spatial and thematic data: the CRISOLA case for Malta and the Eur...Integrating spatial and thematic data: the CRISOLA case for Malta and the Eur...
Integrating spatial and thematic data: the CRISOLA case for Malta and the Eur...Beniamino Murgante
 
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...drboon
 
The emergent opportunity of Big Data for Social Good - Nuria Oliver @ PAPIs C...
The emergent opportunity of Big Data for Social Good - Nuria Oliver @ PAPIs C...The emergent opportunity of Big Data for Social Good - Nuria Oliver @ PAPIs C...
The emergent opportunity of Big Data for Social Good - Nuria Oliver @ PAPIs C...PAPIs.io
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mappingFred Zimmerman
 
Crime mapping and analysis in the dansoman police subdivision, accra, ghana ...
Crime mapping and analysis in the dansoman police subdivision, accra, ghana  ...Crime mapping and analysis in the dansoman police subdivision, accra, ghana  ...
Crime mapping and analysis in the dansoman police subdivision, accra, ghana ...Alexander Decker
 
Crime mapping and analysis in the dansoman police subdivision, accra, ghana ...
Crime mapping and analysis in the dansoman police subdivision, accra, ghana  ...Crime mapping and analysis in the dansoman police subdivision, accra, ghana  ...
Crime mapping and analysis in the dansoman police subdivision, accra, ghana ...Alexander Decker
 
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White PaperLTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White PaperBrian Mollett
 
4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit satIAESIJEECS
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET Journal
 

Ähnlich wie CCTNS & Homeland Security (20)

HLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrowHLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrow
 
HLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrowHLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrow
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Paper
 
Geospatial Technology for Homeland Security
Geospatial Technology for Homeland Security Geospatial Technology for Homeland Security
Geospatial Technology for Homeland Security
 
Integrating spatial and thematic data: the CRISOLA case for Malta and the Eur...
Integrating spatial and thematic data: the CRISOLA case for Malta and the Eur...Integrating spatial and thematic data: the CRISOLA case for Malta and the Eur...
Integrating spatial and thematic data: the CRISOLA case for Malta and the Eur...
 
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
Setting up of a Kenya National Domestic Violence Call Center (K-NDVCC): Proto...
 
The emergent opportunity of Big Data for Social Good - Nuria Oliver @ PAPIs C...
The emergent opportunity of Big Data for Social Good - Nuria Oliver @ PAPIs C...The emergent opportunity of Big Data for Social Good - Nuria Oliver @ PAPIs C...
The emergent opportunity of Big Data for Social Good - Nuria Oliver @ PAPIs C...
 
Cii iq's national business excellence conclave 2013
Cii   iq's national business excellence conclave 2013Cii   iq's national business excellence conclave 2013
Cii iq's national business excellence conclave 2013
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mapping
 
J017555559
J017555559J017555559
J017555559
 
Crime mapping and analysis in the dansoman police subdivision, accra, ghana ...
Crime mapping and analysis in the dansoman police subdivision, accra, ghana  ...Crime mapping and analysis in the dansoman police subdivision, accra, ghana  ...
Crime mapping and analysis in the dansoman police subdivision, accra, ghana ...
 
Crime mapping and analysis in the dansoman police subdivision, accra, ghana ...
Crime mapping and analysis in the dansoman police subdivision, accra, ghana  ...Crime mapping and analysis in the dansoman police subdivision, accra, ghana  ...
Crime mapping and analysis in the dansoman police subdivision, accra, ghana ...
 
LTE WP FINAL
LTE WP FINALLTE WP FINAL
LTE WP FINAL
 
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White PaperLTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
LTE - Advancing the Intelligent Edge with Public Safety LTE White Paper
 
4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat
 
It and safety
It and safetyIt and safety
It and safety
 
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
IRJET- Big Data Analytics of Boko Haram Insurgency Attacks Menace in Nigeria ...
 

Mehr von ADGP, Public Grivences, Bangalore

Mehr von ADGP, Public Grivences, Bangalore (20)

Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Secure it0001
Secure it0001Secure it0001
Secure it0001
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
LTC Word
LTC WordLTC Word
LTC Word
 
LTC - 1
LTC - 1LTC - 1
LTC - 1
 
LTC - 2
LTC - 2LTC - 2
LTC - 2
 
Unreached
UnreachedUnreached
Unreached
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 

Kürzlich hochgeladen

Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
 
unang digmaang pandaigdig tagalog version
unang digmaang pandaigdig tagalog versionunang digmaang pandaigdig tagalog version
unang digmaang pandaigdig tagalog versionGLADYSNUEVO1
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfSERUDS INDIA
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlEdouardHusson
 
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...Christina Parmionova
 
31st World Press Freedom Day Conference.
31st World Press Freedom Day Conference.31st World Press Freedom Day Conference.
31st World Press Freedom Day Conference.Christina Parmionova
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfScottMeyers35
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...Namrata Singh
 
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.Christina Parmionova
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...kumargunjan9515
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learningNAP Global Network
 
NGO working for orphan children’s education
NGO working for orphan children’s educationNGO working for orphan children’s education
NGO working for orphan children’s educationSERUDS INDIA
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLSarandianics
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.Christina Parmionova
 
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Delhi Call girls
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCNAP Global Network
 
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberSareena Khatun
 

Kürzlich hochgeladen (20)

Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
unang digmaang pandaigdig tagalog version
unang digmaang pandaigdig tagalog versionunang digmaang pandaigdig tagalog version
unang digmaang pandaigdig tagalog version
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
 
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
 
31st World Press Freedom Day Conference.
31st World Press Freedom Day Conference.31st World Press Freedom Day Conference.
31st World Press Freedom Day Conference.
 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
 
AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024AHMR volume 10 number 1 January-April 2024
AHMR volume 10 number 1 January-April 2024
 
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...Kolkata Call Girls Halisahar  💯Call Us 🔝 8005736733 🔝 💃  Top Class Call Girl ...
Kolkata Call Girls Halisahar 💯Call Us 🔝 8005736733 🔝 💃 Top Class Call Girl ...
 
3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.3 May, Journalism in the face of the Environmental Crisis.
3 May, Journalism in the face of the Environmental Crisis.
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
NGO working for orphan children’s education
NGO working for orphan children’s educationNGO working for orphan children’s education
NGO working for orphan children’s education
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
Call Girls in Moti Bagh (delhi) call me [8448380779] escort service 24X7
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and NumberCall Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
Call Girls Mehsana / 8250092165 Genuine Call girls with real Photos and Number
 

CCTNS & Homeland Security

  • 1. CCTNS & Homeland Security A Geospatial Perspective Sanjay Sahay, ADGP, Police Computer Wing, Bangalore
  • 2. Crime & Criminal Tracking & Network Systems About the Program • Mission Mode Project under the National e-Governance Plan of Govt. of India • IT-enabled-state-of-the-art tracking system around 'Investigation of crime and detection of criminals' • An allocation of Rs. 2000 Crores has been made for CCTNS Project. • Cabinet Committee on Economic Affairs (CCEA) has approved the project on 19.06.2009. Coverage Approx. 14,000 Police Stations throughout the country 6000 higher offices in police hierarchy Circles, Sub-Divisions, Districts, Range, Zones, Police Headquarters, SCRB
  • 3. Objective Citizen friendly and more transparent Police functioning Delivery of citizen-centric services through effective usage of ICT Provide tools, technology and information to facilitate investigation of crime and detection of criminals Improve Police functioning areas such as Law and Order, Traffic Management etc. Facilitate Interaction and sharing of Information among Police units Assist senior Police Officers in better management of Police Force Keep track of the progress of Cases, including in Courts
  • 5. Scope of Project CCTNSData Centre / DRC Site Preparation / Infrastructure Software Enhancements Capacity Building Data Digitization
  • 6. Scope of Project SIData Centre / DRC Site Preparation / Infrastructure Software Enhancements Capacity Building Data Digitization
  • 7. Police IT - CCTNS • GoI accepted Karnataka as Lead State • Both the Projects get integrated • Mission Mode Project • Wipro, the Developer Police IT CCTNS Lead State CCTNS Police IT
  • 10. Other Components Infrastructure • Client Site Infra • Data Center • DR Center • Connectivity Training • Basic IT • Role Based • System Admin Data Digitization • Crime Data Digitization • Data Migration
  • 11. Advanced Solutions CCTNS - II Crime Analytics Mobile Data Terminal CAD based PCR AVLS Traffic Magt. System Business Intelligence
  • 12. Karnataka CCTNS - Update Pending Change Management Program Train The Trainer ISO Policy On-going CAS-Gap Development Citizen Portal Center-State Integration DR Center Set up Completed Site Preparation Client Site Infrastructure Data Center ( except SSO/SLB) Police IT Enhancements
  • 13. Center – State Integration Karnataka Crime DB National Crime DB State- 1 State- 2 State- 3 State- 4 2-way data transfer
  • 14. All Police Stations have all relevant maps on display Sand models have been a part of standard training
  • 15. The Map of today is the Geospatial Information as the requirements are much more complex yet precise, the demand for which is dictated by ground realities. Herein lies the need for Geospatial Information
  • 16. Geospatial Technology ought to be at the base of CCTNS Google Earth Google Maps Mapmyindia
  • 17. From Crime Analysis to Homeland Security: A Role for Neighborhood Profiling?
  • 18. From Crime Analysis to Homeland Security The Vulnerable Localities Index for Sandwell in the West Midlands region of England. A score of 100 is representative of the study area’s average measure. Values greater than 100 indicate higher measures of vulnerability. Areas with the highest VLI scores are those that should receive focused neighbourhood policing attention (Chainey 2004)
  • 19. Distribution of postcodes with conflict- related deaths in Belfast (1970–2004). Peacelines are labeled
  • 20. Schematic of spatial characteristics of Critical Risk Zones according to Olivares and Maghelal (2005)
  • 21. Internal Security for Communities Location of City of Bryan and Brazos County, Texas
  • 22. Internal Security for Communities Geo-coded addresses of reported sex crimes and suspected offenders
  • 23. Proximity of perpetrators’ dwelling to location of crime they perpetrated than the designated buffers creating child safe zones (Fig. 6.11), indicating the CSZs offer little impact as a preventative measure.
  • 24. Map to show the 2,000 feet proposed buffer around premises where children congregate including school bus stops
  • 25. CCTNS – the road ahead Geospatial Preparedness The power of Processing Appropriate Geospatial Assets Imagery/data as required Processing
  • 26. CCTNS- the road ahead Geospatial Preparedness The power of Processing Inputs as per software requirements Appropriate Software Actionable Output
  • 27. CCTNS – the road ahead Geospatial Preparedness The power of Processing The human expertise Standard Communications & Operations The data/the SP/the Ops Commander all on the same page, real time
  • 28.
  • 29.
  • 30.
  • 31. Homeland Security A Robust Counter Terrorism Mechanism Watershed in Modern Human History
  • 32. Homeland Security A Robust Counter Terrorism Mechanism The attack on the World Trade Center in 2001 has been by far the single most important event in the history of the modern world and more so because it forced the world to change its perception on the nature of organization, the usage of technology, the responses, the consolidation of activities and spread of mechanisms needed to thwart the ever growing terrorism the world over.
  • 34. Mega City Policing Project Criticality of mega cities as economic growth engines Formidable beginning for war against terrorism Connecting the cities would lead to a national network Returning to normalcy insurmountable
  • 35. Leveraging Technology for HLS Gaping holes in technology Functionalities cannot be achieved when basic issues related to execution, back end processes and its robustness is still in question Need of the hour: identification of technological platforms as first foundation stones of HLS in India
  • 36. Technological Framework Command and Control Centre (CCC) Interception Systems (IS) City Based Video Surveillance System (CBVSS)
  • 37. Command and Control Center (CCC) Integrating all fields – radio, audio, video, text, data, images and graphics Through a viable command and control center software Creation of a state of the art C4i
  • 38. Interception Systems( IC) Capability to monitor and penetrate any mode of communication/storage Connect to HLS specific requirements Analyse on a real time basis Up-gradation and Scalability inbuilt
  • 39. City Based Video Surveillance System (CBVSS) Proven track record of providing best possible information ( video footage ) Ajmal Kasab Technologically way ahead of CCTV networks Inbuilt video analytics provides the connects Integrated system. Deterrent and a must!!!
  • 40.
  • 41. Technological Framework TETRA Radio Network (TRN) Geospatial Technology for HLS (GTHLS) ERP Solution, RDBMS and Integration (ERI)
  • 42. TETRA Radio Network (TRN)  TETRA – A Public Safety Network  Fully digital mode  Complete integration of all communication gadgets  Delivery of high quality voice/data/other outputs
  • 44. Geospatial Technology for HLS  Conventional inputs are unable to provided actionable data  Map of today is Geospatial imagery/GIS  Third Eye  Critical for planning, preparation & response
  • 45. Geospatial Technology for HLS  Supports incident management  Great tool for regulation, enforcement, monitoring and supervision
  • 46. Geospatial Technology for HLS  detection, preparedness, prevention, protection, rescue, relief, recovery, and reconstruction  accurate geospatial information in order to accomplish many of the tasks during an emergency response situation  tighter coupling between geospatial technologies and homeland security missions
  • 47. Geographic Information Science  addresses the fundamental issues behind spatial data handling efforts, such as spatial data representation, analysis, modeling, and visualization
  • 49. Part of the Kabul and Pansher landsat mosaic (1:500,000 scale) printed by the CIA during the Soviet-Afghan War showing the area between Salang Pass, Baghram Air Base, and Kabul
  • 50. Remote Sensing and GIS as Counterterrorism Tools for Homeland Security Example of the legend of part of the Kabul III sheet at 1:500,000 scale of the Landsat mosaic in false color made by the CIA in the early 1980s, with gazetteer information on the back
  • 51. Part of the Kabul III sheet showing Kabul in the upper left, the Spin Ghar (Safed Koh) range, the Parachinar (‘parrot’s beak’) border reentrant of the Kurram Agency part of the Northwest Frontier Province of Pakistan into which bin Laden escaped, and the many enumerated passes along the border that are used for smuggling people, drugs, and weapons
  • 52. Example spatial subset of 8 September 2005 AVIRIS scene acquired over the New Orleans vicinity, LA, USA. Shown is band 42 (739.35 nm). The area in the upper right portion of the scene is submerged by Hurricane Katrina- induced floodwaters
  • 53. Economic Impacts of Terrorist Attacks and Natural Disasters Total losses of jobs from the hypothetical hurricane event
  • 54. Isometric view of a hyperspectral AVIRIS image cube, New Orleans area, LA, USA, with bands 42 (739.35 nm), 30 (645.58 nm), and 18 (529.81 nm) as R, G, B for the top-plane image, converted to grayscale. The scene was acquired on 8 September 2005 with a pixel size of ∼9.7 m. The image cube displays, in the z- dimension, 224 spectral channels on the 370–2500-nm wavelength interval
  • 58. Pre- and post-Hurricane Katrina IKONOS satellite images of a portion of New Orleans, LA, USA, acquired on 28 August 2002 (left) and 2 September 2005 (right), respectively (truecolor, converted to grayscale). Building damage and flooded areas are readily apparent in the post-hurricane image on the right. Such outwardly apparent structural damage can be visually interpreted by a human analyst.
  • 59. Agent-Based Modeling and Evacuation Planning Human and Geophysical What if scenarios Agent Based modelling takes care of this and also the simulation process  Evacuation Planning remains to be a challenging task
  • 60. Traffic situations at different times during a simulated evacuation: One and half hours into the evacuation
  • 61. Security Audit •Where it all starts…. Evacuation Plan •For a safer end! Geospatial all the way!
  • 62. Agent-Based Modeling and Evacuation Planning Human and Geophysical What if scenarios Agent Based modelling takes care of this and also the simulation process  Evacuation Planning remains to be a challenging task
  • 63. Building Evacuation in Emergencies  Surge of interest in this field now developing building evacuation analysis using models that focus explicitly upon the human individual’s locus of behavior  Large number of softwares available for modelling and simulating pedestrian evacuation from enclosed spaces
  • 64. Spatial Epidemiology: Where Have We Come in 150 Years? We have a well proven precedent!
  • 65. The Role of Geosurveillance and Security in the Politics of Fear Motive agnostic!
  • 66. The Importance of Spatial Thinking in an Uncertain World
  • 67. Geospatial education and R & D is the key
  • 68. Three characteristics distinguish homeland security applications from other domains: the need for speed; the difficult environments in which technology must operate; and the impossibility of anticipating many relevant kinds of events in either space or time. The challenge!
  • 69. ERP, RDBMS & Integration  Complete functioning of the department on ERP  To be populated in a real time and dynamic mode  RDBMS  Integration of the legacy systems  On single sign in / sign off concept
  • 71. Managerial Response to War on Terror HUGE GAPS in learning, skills and attitudes of internal security managers Human resources should outmatch the technical system Utility is how best we utilize Innovative methods inclusive of outbound learning Change management is the most critical component
  • 72. National Homeland Security Resource Base & Incident Support System Differential levels of technologies & differential levels of mental frames Executed at the division level in a city / then seven cities integrated at the national level Six technologies having their national control centers at any location Six of the these control centers gets integrated into NHLSRB - ISS
  • 73. Integration National Homeland Security – Resource Base and Incident Support System (NHLS – RBISS)
  • 74. National Homeland Security Blueprint The beginning of this grandiose plan set to have a transformational impact on the Homeland Security scenario of the country is yet to be made. The world’s best buildings were a blueprint one day. A blueprint is the first to crystallize our thoughts, it could take a large number of revisions, nonetheless it has to start. Time seems to be running out.