GIS for Internal Security Col (Retd) Richard Sundharam ESRI- India
What is Internal Security? Internal Security is protecting and sustaining a nation s: Population Economy Infrastructure Borders Overall Prosperity 26/11, Mumbai Attack..Preserving our way of Life
Internal Security Model Awareness Identify the Threat Recovery & Reconstitution Natural Disasters National Interests People Infrastructure Economy Prevention Deterrence Technological Disasters Response & Attribution Intentional Attacks Protection Preparedness
Who is Challenged with the Internal Security Mission? Intelligence Agencies Law Enforcement Agencies Disaster Management Authority Health Services Emergency Services (Fire and Medical) Armed Forces.Unity of Action!
Requirements for Effective Internal Security Execution? Shared Vision and Objectives Comprehensive Understanding of Vulnerabilities Effective Resource Management Coordination and Communications Situational Awareness..Need for an Integrating Framework
Internal Security - Critical Infrastructure Data Government Transportation Agriculture Banking and Finance Defence Chemical Industry Energy Services Public Health Information and Telco Making non-explicit relationships and patterns clearer Water Emergency Services Food Postal and Shipping.Managing Data For Internal Security Decision Support
GIS for Internal Security Integrate And Analyze Many Data Sources Coordinated Action Geographic Information System Turn into Actionable Intelligence Creating The Common Picture Share Communicate Collaborate
Intelligence Agency Law Enforcement Defence Disaster Management Health Services Emergency Services (Fire and Medical) GIS Supporting Unity of Action Local Data Local Data Local Data Local Data Local Data Local Data National Spatial Data Infrastructure
Internal Security Mission Challenges Collect and Manage Data Model, Analyze and Assess Vulnerabilities Develop integrated security, protection and mitigation plans Support prevention, response, interdiction and incident management Track and manage resources Establish and maintain shared situational awareness with updates and changes A Complex Multi-Agency Problem
Internal Security Mission Challenges Collect and Manage Data Model, Analyze and Assess Vulnerabilities Develop integrated security, protection and mitigation plans Support prevention, response, interdiction and incident management Track and manage resources Establish and maintain shared situational awareness with updates and changes A Complex Multi-Agency Problem
Internal Security Mission Challenges Collect and Manage Data Model, Analyze and Assess Vulnerabilities Develop integrated security, protection and mitigation plans Support prevention, response, interdiction and incident management Track and manage resources Establish and maintain shared situational awareness with updates and changes A Complex Multi-Agency Problem
Internal Security Mission Challenges Collect and Manage Data Model, Analyze and Assess Vulnerabilities Develop integrated security, protection and mitigation plans Support prevention, response, interdiction and incident management Track and manage resources Establish and maintain shared situational awareness with updates and changes A Complex Multi-Agency Problem
Internal Security Mission Challenges Collect and Manage Data Model, Analyze and Assess Vulnerabilities Develop integrated security, protection and mitigation plans Support prevention, response, interdiction and incident management Track and manage resources Establish and maintain shared situational awareness with updates and changes A Complex Multi-Agency Problem
GIS Provides - Essential Capabilities for Internal Security Mobile Systems Planning & Analysis Data Management Operational Awareness...Timely, And Efficient Collaboration, Problem Solving, and Decision-making
Information System for Internal Security Internal Security Information System 15
Information System for Internal Security Resource Management Data Storage and Fusion Data Production & Distribution Data Management Internal Security Information System 16
GIS for Data Management Creating a Stronger Platform Operationalize Plans Collect, Produce, And Disseminate Data Create, Publish & Maintain New GIS Data Store and Access Other Data Geo-Database Manage Mobile Data Transactions COP Access and Manage Online GIS and Dynamic Services 17
Threat Analysis Planning & Analysis Course of Action Analysis Plans & Orders Information System for Internal Security Resource Management Data Storage and Fusion Data Production & Distribution Data Management Internal Security Information System 18
Risk and Hazard Analysis
Natural Hazards
Technological Hazards HazMat Routes
Technological Hazards Rail Lines
Technological Hazards HazMat Locations
All Hazards
All Hazards Combined
Critical Infrastructure
Population Vulnerability
Overall Assessment
Operationalizing Plans
Threat Analysis Planning & Analysis Course of Action Analysis Plans & Orders Information System for Internal Security Resource Management Data Storage and Fusion Data Production & Distribution Data Management Internal Security Information System Field/Mobile Operations Field Data Collection Command & Control 30
Status of Work
Field Impact Reporting
Mobile Mapping Damage and Casualties
GIS for Field Operations 34
User-Defined Operating Picture Threat Analysis Common Operating Picture Situational Awareness Planning & Analysis Course of Action Analysis Secure Data Sharing Plans & Orders Information System for Internal Security Resource Management Data Storage and Fusion Data Production & Distribution Data Management Internal Security Information System Field/Mobile Operations Field Data Collection Command & Control 35
Situational Awareness Dynamic Data Feeds
User-Defined Operating Picture Threat Analysis Common Operating Picture Situational Awareness Planning & Analysis Course of Action Analysis Secure Data Sharing Plans & Orders Information System for Internal Security Resource Management Data Storage and Fusion Data Production & Distribution Data Management Internal Security Information System Field/Mobile Operations Field Data Collection Command & Control 38
Summary : Patterns of GIS Use Data Management Planning & Analysis Field Mobility Situational Awareness A Complete Integrated System Collect, organize, and exchange data Transform data into actionable information Get information Into and out of the field Disseminate knowledge where and when it s needed Geodatabase Geoprocessing Mobile Web APIs Enterprise Web / Cloud Device Pervasive 39
ArcGIS Enables Internal Security A Complete System for Geographic Information 40
Thank You