Connect & Protect – an advanced safety
 and security information service for
      government and industry
                   Peter Eriksson, Patrik Stridh
       1Future Position X, Box 975, Gävle, 80133, Sweden
            Tel: +46 026 61 44 00, Email: info@fpx.se
        2Organisation, Address, City, Postcode., Country

       Tel: +4670 638 9594 , Email: peter.eriksson@fpx.se
.

1. Introduction – Connect & Protect
1   Key words: Security, Information sharing, communities of trust, emergency
    management, intelligence, Web 2.0

2   Experiences from disasters and emergencies show that one of the major challenges to
    managing an incident or emergency event is efficient sharing of information across
    organizations. Failure to target proper information to the right recipient in time may
    result in damage of property and, worst case, losses of lives. Being able to not only
    share common operating pictures, but also enabling professionals to create and share
    their own “personal” operating picture based on their role and field of responsibility
    (and related information needs), supports making more informed decisions,
    collaboration across organizations and efficient use of resources.

3   Over the past two years, Future Position X has coordinated a program in Sweden to
    support improved collaboration related to emergency events and threats at both local,
    national and international level.

4   This paper will provide experiences from both the local level, with participation from
    fire services, hospital and ambulance services, local government, county administration,
    and the national level with a number of government agencies. Particular focus has been
    placed on mobility.

5   The program is based on Connect & Protect, a web-based information sharing service to
    help organizations stay better informed of late-breaking threats and events and
    becoming more resilient. The service supports intelligence gathering and creation and
    sharing of common operating pictures by fusing various automated and manual online
    data feeds. Such data feeds may be ranging from global to domestic sources and
    spanning areas like natural disasters, accidents, terrorist acts, traffic incidents, weather,
    critical infrastructure disturbances, news etc. The platform is scalable from local to
    regional to national to international level. The Connect & Protect service supplies this
    information in a secure and trusted manner, where authorized users can set up
    communities to share sensitive and critical information during crises to enhance
    interorganisational collaboration.
2. Objectives

1. To be a national system for information sharing cross organizations.

2. To be a international system for information sharing cross organizations.

3. Extend the reach of vital, life-saving, real-time emergency information to emergencie
   first responders, community safety stakeholders, such as schools, hospitals, large
   employers, et al.
4. Increase information sharing between public and private sectors for increased public
   safety.

5. Lower communications costs through the use of a highly automated functions fore
   information sharing and dissemination.


3. Methodology
The national project has been a very hands-on proof-of-concept project, where the initial
objective was to test if the experiences from the 911 centrals could be implemented in a
Swedish context. The project group has consisted of representatives from 10 national
government agencies. Much of the initial work consisted of information mapping to decide
suitable sources for integration. Common priorities have been made through a number of
joint workshops, followed up by implementation and testing (both in the field and in
command stations). This has been continuously ongoing throughout the entire project. One
of the biggest challenges has been to see how Swedish laws support information sharing
across organization through the communities of trust model. The absolute strength of the
service is that it lets the content owner administrate its information resources. They thereby
decide and control their own information and who should have access to the information.
That has been the absolute number one key benefit! One critical aspect involves identifying
information hierarchies to support establishment and different levels of information sharing
through communities of trust.
6. Technology Description
The service has been designed to support four main objectives:

7. Access to aggregated, time-critical information as decision support
   •   Facilitate information gathering from many different sources by combining and
       visualising data through a unified, easy-to use configurable interface
   •   Aggregate information based on subject or event, to enable users to quickly interpret
       and identify important related information, i e “connect the dots”.
   •   Deliver alerts and notifications adjusted to each recipients profile and preferences,
       using filters such as subject, alert level, time or geography.
   •   Support common operating awareness by integrated geographic information
   •   Enable alerting and notification through various media incl PC and mobile units.
   •   Dynamically extend the number of persons and functions given access to correct
       information on time.

8. Create and manage work groups and information rights (a k a ”Communities of Trust”)
   for information exchange between trusted members in a workgroup
   •   Structure AND flexibility; authorized members in a work group can securely share
       sensitive information within predefined (e g harbor security) work groups or
       temporarily created work groups (e g Avian flue outbreak) spanning across
       organizational boundaries
   •   Support management of work groups; such as inviting and authorizing new
       members, enforce policies and rules, configure content, provide check-lists,
       supportive information etc
   •   Manage and create “sub-groups”, to meet the need for different levels of
       authorization within a community.

9. Simple and efficient information exchange for speed and user friendliness
   •   Support automated alerting, with immediate notification to each authorized recipient
   •   Enable users to filter information flows based on their needs reducing irrelevant
       information ”overflow”.
   •   Provide access to critical information from any web-connected computer or mobile
       cell phone across the world.
   •   Simplify access and integration of webb-based information sources; by using web
       services 2.0 and other standards, such as the Common Alerting Protocol (CAP).

10. Standardised security to create trust and secure transfer of sensitive information
   •   Full tractability on all system activity, inkl who took part of information
•   Password-based authentication and access
   •   Authorization based on security level at end-user
   •   Encrypted transfer

Since Connect & Protect is built on a service-oriented systems architecture, it is easy to
integrate new data sources, given that these are specified in a unified manner. A number of
local and national Swedish information feeds have been integrated, such as 112 alerts,
weather, map services, web cams etc. All RSS-feeds are supported

11. TIES Architecture
13. TIES Overview
Actionable mission-critical information where and when you need it.

TIES is a Web 2.0 information sharing service used by public and private Communities of Trust
concerned with security risks, supply chain bottlenecks, brand compromise, and more. TIES
delivers:
   •   Up-to-the-minute critical information from thousands of sources: open source, commercial
       and government-restricted
   •   Customized and configurable dashboards for relevance to you
   •   Layered “operational pictures” for any and all enterprise functions
   •   Community of Trust management
   •   Advanced, policy-driven targeting and filtering




As part of the TIES system, TIES Mobile provides secure, location-aware two-way alerting.
With support for both standard browser and Windows Mobile platforms, TIES Mobile
drives real-time alerts and maps to Blackberry, iPhone, Windows Mobile 5/6 devices. TIES
Mobile delivers:

   •   Field-based alert creation with multi-media support (image, video and audio)

   •   Continuous tracking of mobile users or assets (e.g. Executive Protection)

   •   Dynamic alert mapping

   •   GPS tracking

   •   Secure, audited transactions


14. TIES Mobile Overview
Mission-critical information for situational awareness, safety and risk management—
wherever you are. As part of the TIES system, TIES Mobile displays real-time safety,
security and risk management data consolidated from many sources directly to a mobile
device. Engineered specifically for ease of use, TIES Mobile provides secure locationally
aware two-way alerting.

   •   Displays TIES-filtered alerts near your current location

   •   Lets you create alerts in the field and upload into the TIES system—capture alert
       details, location, pictures

   •   Dynamic alert mapping




15.Results
Government Credentials
  •2008: Operation Golden Phoenix '08

   •2008: Controlled Unclassified Information (CUI)

   •2006–2007: Spirals 1 and 2, Last Mile Intelligence Techniques (LMIT) program,
      Office of the Director of National Intelligence (ODNI)

   •2006: Information Sharing Cooperative Research and Development Agreement
      (CRADA) with NSA’s Information Assurance Directorate

   •2006: Synthetic Cities, Joint Forces Command, Dept of Defence
•2004: Joint Warfighter Interoperability Demonstration, NORTHCOM

   •2003–present: Connect & Protect, City of Portland, Multnomah County, State of
      Oregon, et. Al

   •2004-05: LA RECON (Louisiana Emergency Command Operations Network), Dept of
      Defence Homeland Security and Defence Command and Control Advanced Concept
      Technology Demonstration (HLS/D C2 ACTD)

   •2003-04: TRANSEC-Net, a 22-port Information Sharing Pilot, TSA, Dept of
      Homeland Security

   •2002-2005: Homeland Security and Defence Command and Control Advanced
      Concept Technology Demonstration (HLS C2 ACTD) Dept of Defence.

Awards and Recognition
  •2006: The CRADA between Swan Island Networks and the NSA/IAD is the subject of
     a two-part information sharing political analysis published in the Washington Times

   •2005: Wired Magazine publishes a story about Connect & Protect (an information
      sharing service based on Swan Island Networks' technology) describing it as a
      “radical breakthrough” in emergency management

   •2005: Swan Island Networks’ CEO wins Federal Computer Week 16th annual Federal
      100 Award

   •2004: Connect & Protect is a finalist for the Homeland Security Innovation of the Year,
      given by the Ash Institute at Harvard’s John F. Kennedy School of Government

   •2004: Swan Island Networks’ flagship SWARM technology wins Top Ten Performer
      Award, Joint Warfighter Interoperability Demonstration

   •2003: Swan Island Networks’ CEO speaks at a US Chamber of Commerce conference,
      “The National Response Plan: Implications for Government, Non-Profit and Private
      Sector Disaster Coordination”

16.Business Benefits
   •Managed Services: Low-cost, agile commercial-off-the-shelf information services are
     quickly replacing expensive proprietary systems.

   •Agile Mashups: New Web 2.0-style geospatial systems are dynamically fusing
      together a variety of information sources—and providing flexible new views of
      changing conditions, in real-time.

   •Communities of Trust: Requirements for cross-agency, cross-jurisdiction information
      sharing services are met with new community-based information access models.
17.Conclusions

A number of incidents and events, like the tsunami and various storms over the past years,
clearly show the need for collaboration between government agencies to manage
unexpected events and threats to society. Various initiatives have been made to facilitate
this, including organisational changes, methods and technological development. Many
organisations have developed their own command and control systems and in some cases
exchange information with other agencies, but usually through “stovepipes”. Many
organisations do however still lack application support for gathering information and
sharing this with others in a secure manner. Getting organisations to collaborate in
information sharing to support intelligence gathering and operational work is to a large
degree a matter of mindset. Such projects do take time. Building trust is a key factor, where
each information owner has concerns about the control and full ownership of his/her
information and wh has access to this. Using a community structure similar to what has
been implemented in Connect & Protect, this hurdle can be overcome.

Conclusions from the project are that such a system as Connect & Protect can be
implemented in a Swedish context within existing organisational framework. The project
shows that there is a need for collaborative solutions that support sharing of emergency-
related information across organisations. Development and use of standards for messaging,
data feeds like RSS and geospatial mapping for publishing information is vital, and many of
the involved agencies admit they need to review their existing information structures as
their specific information is often “locked” into stovepipe applications. As the number of
information resources grow exponentially and become available through various media and
news services, there is an increasing need to provide access to various sources through a
common interface. This enables forming a common operating picture across organisations
and yet allows for flexibility to customise information views based on each users/
organisations needs and responsibilities. Empowering each information owner to control
their own information and who has access to it is vital to the success of collaborative efforts
in forming common operating pictures and sharing that information with others.

References
[1]
[2]
[3]

More Related Content

PDF
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
PDF
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
PPTX
Achieving Caribbean Cybersecuirty
PPTX
DocomUSA Cyber Security
PPTX
Big Data and Security - Where are we now? (2015)
PPTX
Mediating with Technology.: Opportunities and Risks
PPTX
ICAANZ VPDSS presentation by Paul O'Connor
PPTX
National policy and strategy
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Achieving Caribbean Cybersecuirty
DocomUSA Cyber Security
Big Data and Security - Where are we now? (2015)
Mediating with Technology.: Opportunities and Risks
ICAANZ VPDSS presentation by Paul O'Connor
National policy and strategy

What's hot (19)

PPTX
Homeland Open Security Technologies (HOST)
PPT
National Information Exchange Model
DOCX
Gsn 2014 digital yearbook of homeland security awards
PDF
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
PPT
Privacy icms (handouts)
PDF
Establishing a Trusted Identity in Cyberspace
PPTX
PPT
Risks and Benefits of Cloud Computing
PDF
Online Focus Groups Privacy and Security Considerations
PDF
D372326.pdf
PDF
Data Leak Protection Using Text Mining and Social Network Analysis
PDF
Big data contains valuable information - Protect It!
PPTX
Models of Escalation and De-escalation in Cyber Conflict
PDF
Improved-Cybersecurity-cooperation
PDF
Cyber War, Cyber Peace, Stones and Glass Houses
PDF
Etude sur le marché de la cyber sécurité (2011)
PDF
ISACA Canberra 30th annivesary press release
PDF
ISACA Canberra 30th annivesary press release
PDF
Zimbabwe's cybercrime & cybersecurity bill 2017
Homeland Open Security Technologies (HOST)
National Information Exchange Model
Gsn 2014 digital yearbook of homeland security awards
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Privacy icms (handouts)
Establishing a Trusted Identity in Cyberspace
Risks and Benefits of Cloud Computing
Online Focus Groups Privacy and Security Considerations
D372326.pdf
Data Leak Protection Using Text Mining and Social Network Analysis
Big data contains valuable information - Protect It!
Models of Escalation and De-escalation in Cyber Conflict
Improved-Cybersecurity-cooperation
Cyber War, Cyber Peace, Stones and Glass Houses
Etude sur le marché de la cyber sécurité (2011)
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
Zimbabwe's cybercrime & cybersecurity bill 2017
Ad

Similar to Connect And Protect (20)

PDF
Why the Private Sector is Key to Cyber Defence
PPT
2012 04 23_masas
PDF
Nordic IT Security 2014 agenda
PPTX
Crisis Management Tekes Safety and Security programme 2013
PPT
Disaster Risk Management in the Information Age
PDF
Critical Infrastructure and Cyber Security: trends and challenges
PDF
Gmn full ad_mini-1
PDF
Collaborative Cyber Threat Intelligence Detecting And Responding To Advanced ...
PDF
Industrial Control Security USA Sacramento California Oct 6/7
PDF
Framework for cybersecurity info sharing
PDF
Congress 2012: Does the Cloud Have a Role in Fixing the Economy? – David King
PPT
ICT and Disaster Management
PDF
Public safety in a multi media era facilitating incident management response
PDF
PDF
CrisisCommons Statement for the Record
PDF
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
PPT
Sask 3.0 Summit David G. Brown
PDF
Cyber security notes or Mca/bca about security
PDF
Information System to Assist Survivors of Disasters
Why the Private Sector is Key to Cyber Defence
2012 04 23_masas
Nordic IT Security 2014 agenda
Crisis Management Tekes Safety and Security programme 2013
Disaster Risk Management in the Information Age
Critical Infrastructure and Cyber Security: trends and challenges
Gmn full ad_mini-1
Collaborative Cyber Threat Intelligence Detecting And Responding To Advanced ...
Industrial Control Security USA Sacramento California Oct 6/7
Framework for cybersecurity info sharing
Congress 2012: Does the Cloud Have a Role in Fixing the Economy? – David King
ICT and Disaster Management
Public safety in a multi media era facilitating incident management response
CrisisCommons Statement for the Record
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Sask 3.0 Summit David G. Brown
Cyber security notes or Mca/bca about security
Information System to Assist Survivors of Disasters
Ad

More from Future Position X (20)

PDF
Made in Sweden
PDF
Press Kina 100412
PDF
Fpx Poster English Low
PDF
FPX Clusterstory 10
PDF
FPX Clusterstory 7
PDF
FPX Clusterstory 8
PDF
FPX Clusterstory 9
PDF
FPX Clusterstory 2
PDF
FPX Clusterstory 3
PDF
FPX Clusterstory 6
PDF
FPX Clusterstory 5
PDF
FPX Clusterstory 4
PDF
FPX Clusterstory 1
DOC
Pressinfo Kina100212
DOC
Pressinbjudankina100212
DOC
Inbjudan Testseminarium 16 Mars 2010
PDF
Point2point
PDF
Chinese FPX info
PDF
ChineseHiG
PDF
Made in Sweden
Press Kina 100412
Fpx Poster English Low
FPX Clusterstory 10
FPX Clusterstory 7
FPX Clusterstory 8
FPX Clusterstory 9
FPX Clusterstory 2
FPX Clusterstory 3
FPX Clusterstory 6
FPX Clusterstory 5
FPX Clusterstory 4
FPX Clusterstory 1
Pressinfo Kina100212
Pressinbjudankina100212
Inbjudan Testseminarium 16 Mars 2010
Point2point
Chinese FPX info
ChineseHiG

Recently uploaded (20)

PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Modernising the Digital Integration Hub
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Five Habits of High-Impact Board Members
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A review of recent deep learning applications in wood surface defect identifi...
Consumable AI The What, Why & How for Small Teams.pdf
Modernising the Digital Integration Hub
OpenACC and Open Hackathons Monthly Highlights July 2025
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Architecture types and enterprise applications.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Custom Battery Pack Design Considerations for Performance and Safety
sbt 2.0: go big (Scala Days 2025 edition)
Credit Without Borders: AI and Financial Inclusion in Bangladesh
A contest of sentiment analysis: k-nearest neighbor versus neural network
NewMind AI Weekly Chronicles – August ’25 Week III
Five Habits of High-Impact Board Members
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
UiPath Agentic Automation session 1: RPA to Agents
Enhancing emotion recognition model for a student engagement use case through...
The influence of sentiment analysis in enhancing early warning system model f...
1 - Historical Antecedents, Social Consideration.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Connect And Protect

  • 1. Connect & Protect – an advanced safety and security information service for government and industry Peter Eriksson, Patrik Stridh 1Future Position X, Box 975, Gävle, 80133, Sweden Tel: +46 026 61 44 00, Email: info@fpx.se 2Organisation, Address, City, Postcode., Country Tel: +4670 638 9594 , Email: peter.eriksson@fpx.se
  • 2. . 1. Introduction – Connect & Protect 1 Key words: Security, Information sharing, communities of trust, emergency management, intelligence, Web 2.0 2 Experiences from disasters and emergencies show that one of the major challenges to managing an incident or emergency event is efficient sharing of information across organizations. Failure to target proper information to the right recipient in time may result in damage of property and, worst case, losses of lives. Being able to not only share common operating pictures, but also enabling professionals to create and share their own “personal” operating picture based on their role and field of responsibility (and related information needs), supports making more informed decisions, collaboration across organizations and efficient use of resources. 3 Over the past two years, Future Position X has coordinated a program in Sweden to support improved collaboration related to emergency events and threats at both local, national and international level. 4 This paper will provide experiences from both the local level, with participation from fire services, hospital and ambulance services, local government, county administration, and the national level with a number of government agencies. Particular focus has been placed on mobility. 5 The program is based on Connect & Protect, a web-based information sharing service to help organizations stay better informed of late-breaking threats and events and becoming more resilient. The service supports intelligence gathering and creation and sharing of common operating pictures by fusing various automated and manual online data feeds. Such data feeds may be ranging from global to domestic sources and spanning areas like natural disasters, accidents, terrorist acts, traffic incidents, weather, critical infrastructure disturbances, news etc. The platform is scalable from local to regional to national to international level. The Connect & Protect service supplies this information in a secure and trusted manner, where authorized users can set up communities to share sensitive and critical information during crises to enhance interorganisational collaboration.
  • 3. 2. Objectives 1. To be a national system for information sharing cross organizations. 2. To be a international system for information sharing cross organizations. 3. Extend the reach of vital, life-saving, real-time emergency information to emergencie first responders, community safety stakeholders, such as schools, hospitals, large employers, et al. 4. Increase information sharing between public and private sectors for increased public safety. 5. Lower communications costs through the use of a highly automated functions fore information sharing and dissemination. 3. Methodology The national project has been a very hands-on proof-of-concept project, where the initial objective was to test if the experiences from the 911 centrals could be implemented in a Swedish context. The project group has consisted of representatives from 10 national government agencies. Much of the initial work consisted of information mapping to decide suitable sources for integration. Common priorities have been made through a number of joint workshops, followed up by implementation and testing (both in the field and in command stations). This has been continuously ongoing throughout the entire project. One of the biggest challenges has been to see how Swedish laws support information sharing across organization through the communities of trust model. The absolute strength of the service is that it lets the content owner administrate its information resources. They thereby decide and control their own information and who should have access to the information. That has been the absolute number one key benefit! One critical aspect involves identifying information hierarchies to support establishment and different levels of information sharing through communities of trust.
  • 4. 6. Technology Description The service has been designed to support four main objectives: 7. Access to aggregated, time-critical information as decision support • Facilitate information gathering from many different sources by combining and visualising data through a unified, easy-to use configurable interface • Aggregate information based on subject or event, to enable users to quickly interpret and identify important related information, i e “connect the dots”. • Deliver alerts and notifications adjusted to each recipients profile and preferences, using filters such as subject, alert level, time or geography. • Support common operating awareness by integrated geographic information • Enable alerting and notification through various media incl PC and mobile units. • Dynamically extend the number of persons and functions given access to correct information on time. 8. Create and manage work groups and information rights (a k a ”Communities of Trust”) for information exchange between trusted members in a workgroup • Structure AND flexibility; authorized members in a work group can securely share sensitive information within predefined (e g harbor security) work groups or temporarily created work groups (e g Avian flue outbreak) spanning across organizational boundaries • Support management of work groups; such as inviting and authorizing new members, enforce policies and rules, configure content, provide check-lists, supportive information etc • Manage and create “sub-groups”, to meet the need for different levels of authorization within a community. 9. Simple and efficient information exchange for speed and user friendliness • Support automated alerting, with immediate notification to each authorized recipient • Enable users to filter information flows based on their needs reducing irrelevant information ”overflow”. • Provide access to critical information from any web-connected computer or mobile cell phone across the world. • Simplify access and integration of webb-based information sources; by using web services 2.0 and other standards, such as the Common Alerting Protocol (CAP). 10. Standardised security to create trust and secure transfer of sensitive information • Full tractability on all system activity, inkl who took part of information
  • 5. Password-based authentication and access • Authorization based on security level at end-user • Encrypted transfer Since Connect & Protect is built on a service-oriented systems architecture, it is easy to integrate new data sources, given that these are specified in a unified manner. A number of local and national Swedish information feeds have been integrated, such as 112 alerts, weather, map services, web cams etc. All RSS-feeds are supported 11. TIES Architecture
  • 6. 13. TIES Overview Actionable mission-critical information where and when you need it. TIES is a Web 2.0 information sharing service used by public and private Communities of Trust concerned with security risks, supply chain bottlenecks, brand compromise, and more. TIES delivers: • Up-to-the-minute critical information from thousands of sources: open source, commercial and government-restricted • Customized and configurable dashboards for relevance to you • Layered “operational pictures” for any and all enterprise functions • Community of Trust management • Advanced, policy-driven targeting and filtering As part of the TIES system, TIES Mobile provides secure, location-aware two-way alerting. With support for both standard browser and Windows Mobile platforms, TIES Mobile drives real-time alerts and maps to Blackberry, iPhone, Windows Mobile 5/6 devices. TIES Mobile delivers: • Field-based alert creation with multi-media support (image, video and audio) • Continuous tracking of mobile users or assets (e.g. Executive Protection) • Dynamic alert mapping • GPS tracking • Secure, audited transactions 14. TIES Mobile Overview
  • 7. Mission-critical information for situational awareness, safety and risk management— wherever you are. As part of the TIES system, TIES Mobile displays real-time safety, security and risk management data consolidated from many sources directly to a mobile device. Engineered specifically for ease of use, TIES Mobile provides secure locationally aware two-way alerting. • Displays TIES-filtered alerts near your current location • Lets you create alerts in the field and upload into the TIES system—capture alert details, location, pictures • Dynamic alert mapping 15.Results Government Credentials •2008: Operation Golden Phoenix '08 •2008: Controlled Unclassified Information (CUI) •2006–2007: Spirals 1 and 2, Last Mile Intelligence Techniques (LMIT) program, Office of the Director of National Intelligence (ODNI) •2006: Information Sharing Cooperative Research and Development Agreement (CRADA) with NSA’s Information Assurance Directorate •2006: Synthetic Cities, Joint Forces Command, Dept of Defence
  • 8. •2004: Joint Warfighter Interoperability Demonstration, NORTHCOM •2003–present: Connect & Protect, City of Portland, Multnomah County, State of Oregon, et. Al •2004-05: LA RECON (Louisiana Emergency Command Operations Network), Dept of Defence Homeland Security and Defence Command and Control Advanced Concept Technology Demonstration (HLS/D C2 ACTD) •2003-04: TRANSEC-Net, a 22-port Information Sharing Pilot, TSA, Dept of Homeland Security •2002-2005: Homeland Security and Defence Command and Control Advanced Concept Technology Demonstration (HLS C2 ACTD) Dept of Defence. Awards and Recognition •2006: The CRADA between Swan Island Networks and the NSA/IAD is the subject of a two-part information sharing political analysis published in the Washington Times •2005: Wired Magazine publishes a story about Connect & Protect (an information sharing service based on Swan Island Networks' technology) describing it as a “radical breakthrough” in emergency management •2005: Swan Island Networks’ CEO wins Federal Computer Week 16th annual Federal 100 Award •2004: Connect & Protect is a finalist for the Homeland Security Innovation of the Year, given by the Ash Institute at Harvard’s John F. Kennedy School of Government •2004: Swan Island Networks’ flagship SWARM technology wins Top Ten Performer Award, Joint Warfighter Interoperability Demonstration •2003: Swan Island Networks’ CEO speaks at a US Chamber of Commerce conference, “The National Response Plan: Implications for Government, Non-Profit and Private Sector Disaster Coordination” 16.Business Benefits •Managed Services: Low-cost, agile commercial-off-the-shelf information services are quickly replacing expensive proprietary systems. •Agile Mashups: New Web 2.0-style geospatial systems are dynamically fusing together a variety of information sources—and providing flexible new views of changing conditions, in real-time. •Communities of Trust: Requirements for cross-agency, cross-jurisdiction information sharing services are met with new community-based information access models.
  • 9. 17.Conclusions A number of incidents and events, like the tsunami and various storms over the past years, clearly show the need for collaboration between government agencies to manage unexpected events and threats to society. Various initiatives have been made to facilitate this, including organisational changes, methods and technological development. Many organisations have developed their own command and control systems and in some cases exchange information with other agencies, but usually through “stovepipes”. Many organisations do however still lack application support for gathering information and sharing this with others in a secure manner. Getting organisations to collaborate in information sharing to support intelligence gathering and operational work is to a large degree a matter of mindset. Such projects do take time. Building trust is a key factor, where each information owner has concerns about the control and full ownership of his/her information and wh has access to this. Using a community structure similar to what has been implemented in Connect & Protect, this hurdle can be overcome. Conclusions from the project are that such a system as Connect & Protect can be implemented in a Swedish context within existing organisational framework. The project shows that there is a need for collaborative solutions that support sharing of emergency- related information across organisations. Development and use of standards for messaging, data feeds like RSS and geospatial mapping for publishing information is vital, and many of the involved agencies admit they need to review their existing information structures as their specific information is often “locked” into stovepipe applications. As the number of information resources grow exponentially and become available through various media and news services, there is an increasing need to provide access to various sources through a common interface. This enables forming a common operating picture across organisations and yet allows for flexibility to customise information views based on each users/ organisations needs and responsibilities. Empowering each information owner to control their own information and who has access to it is vital to the success of collaborative efforts in forming common operating pictures and sharing that information with others. References [1] [2] [3]