Disaster Risk Management in the Information Age

28
© 2008 IBM Corporation. Disaster Risk Management in the Information Age ICT, Disaster Risk Assessment, Mitigation, and Reduction Transforming the Business of Public Safety & Security Andrew S. Levy IBM Corporate Service Corps Fellow [email protected]

description

International Day for Disaster Reduction at the World Bank Disaster Risk Management in the Information Age A joint training workshop by GICT, GFDRR, infoDev and LCSUW to mark the International Day for Disaster Reduction

Transcript of Disaster Risk Management in the Information Age

Page 1: Disaster Risk Management in the Information Age

© 2008 IBM Corporation.

Disaster Risk Management in the Information Age

ICT, Disaster Risk Assessment, Mitigation, and Reduction

Transforming the Business ofPublic Safety & Security

Andrew S. LevyIBM Corporate Service Corps [email protected]

Page 2: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 2

Overview

Disasters Happen – Corporate Response

Lessons Learned From a Developing Region

Technical Maturity

Collaboration and Web 2.0

Plans, Information Requirements and Sources

Modeling and Simulation

Technology Vision and Integrated Solutions

Enterprise Services / SOA Framework

Case Studies / Client Examples

Questions

Page 3: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 3

“IBM has a tradition of responding whenever there’s a disaster, whenever there’s a significant occurrence in one of the communities where we live and work. That’s part of being a good corporate citizen and also leverages IBM’s most fundamental assets – technology and the incredible skills and volunteerism of our employees.”

Robin Willner

Vice President

IBM Global Community Initiatives

Page 4: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 4

Free & Open Source (LAMP) application from community led by Lanka Software Foundation, Sri Lanka

Modules include Organization registry, Request Management system, Shelter registry, Missing Persons registry, etc.

IBM has deployed Sahana in collaboration with Lanka Software Foundation in recent disaster response efforts:

Earthquake in Pakistan (August 2005) Earthquake in Peru (August 2007) Earthquake in Sichuan province, China (May 2008) Flooding in Bihar State, India (August 2008)

Sahana Disaster Management System

Page 5: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 5

Mitigation and Reduction Requires Training and Exercise

Page 6: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 6

With Focus on Cultural Awareness, Environment and Change

Page 7: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 7

Effective public safety incident response and management requires coordination and information sharing in the field among multiple responder agencies. Non-governmental organizations (NGOs) and commercial enterprises face similar challenges when major disruptive or catastrophic incidents occur.

Incident response and scene management is often hampered by the inability of mobile responders from different organizations to communicate.

ICT Can Be Core To The Solution, But Creates Challenges

Major highway traffic incidents Train or aircraft crashes Multi-alarm fires Hazardous materials spills Contagious disease outbreaks

Extreme weather events Earthquakes Hostage situations Terrorist attacks

Page 8: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 8

Instant Collaboration Solutions enable secure interoperability among government and commercial incident response organizations by providing the following functions to both mobile and office-based personnel

Text messagingAccess to federated data sources Basic incident management

Translating out-dated technology into business value

Solutions Include Instant Collaboration and Web 2.0

Low total cost of ownership (TCO) Minimal impact upon existing IT investments Open, scalable, modular Web-based architecture Extensive use of commercial off-the-shelf software (COTS) Solid security with role-based authorization Custom design, integration, delivery and support One-to-one, one-to-many, and many-to-many communications over various

networks and end-user devices

Page 9: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 9

Secure Wireless Infrastructure System

On demand solution deployable at short notice, regardless of location Key in Disaster Recovery plan after a natural event or terrorist attack Enables Emergency Services to manage and coordinate their

response effectively Provides an On-Demand high speed data network to remote locations

or during crisis where local communications are non existent or have been temporarily impaired

Wide Area Reach back to the Internet and/or Agency Intranet

Wireless Local Area connectivity for onsite Servers, Laptops and handheld devices

Secure Voice Services Support for legacy protocols and data services Exportable End-to-End encryption

Page 10: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 10

Technology can provide critical information far beyond traditional monitoring for a wide range of practical usage, with flexibility and control.

Effective Decisions to Reach Virtually Anywhere to Work Smarter Tools that Matter

Information is useful before, during, and after a reported incident or response. Awareness of conditions reported,

developing, or to be monitored Response with tactical video

information to augment radio communications

Speeds Investigation after a reported incident

Evidence to support prosecution, with strict security and chain of custody – increased conviction rates, reduces litigation claims

Page 11: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 11

Dynamic, Living Plans

Plans in the form of static documents are ineffective

Plans must be maintained as evolving, actionable information environments

Planning environment must transition seamlessly into command and control environment

Multi-Agency Coordination

Page 12: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 12

Key Challenge - Information is Scattered

Law Enforcement Data Exchanges

Criminal Justice, Corrections Agencies

Regional Centers of Operations

Federal,Regional,HomelandSecurity

Fire Dept, Early Responders, Other Disciplines

InformationRequirements

Page 13: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 13

Enabling the Possibilities

We must collect, integrate, and analyze the scattered pieces of data and information required to assemble the big picture

Page 14: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 14

Modeling and SimulationDeep Thunder – Forecasts for Weather-Sensitive Operations

Problem: weather-sensitive business operations are often reactive to short-term (3 to 36 hours), local conditions (city, county, state) due to unavailability of appropriate predicted data at this scale

– Energy, transportation, agriculture, insurance, broadcasting, sports, entertainment, tourism, construction, communications, emergency planning and security warnings

Solution: application of reliable, affordable, weather models for predictive & proactive decision making & operational planning

– Numerical weather forecasts coupled to business processes

– Products and operations customized to business problems

– Competitive advantage -- efficiency, safety, security and economic & societal benefit

Page 15: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 15

Networked Video - Wide Range of potential placements of Networked Video for Public Safety

Streets, Roadways, Public Spaces

Schools

Effective Information

CommandBuses

Public Safety Vehicles

Personnel

Page 16: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 16

IBM developed innovative camera enclosures and installations

Network Edge Kit Flexibility in configuration, upgrades, visibility and maintenance

Camera and sensors areindependent of communications equipment and can be remotelymounted

Upgrade to wireless: WiFi or Mesh

Antenna mounted with eithercamera or communications

Page 17: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 17

Recognizes the single identity who is made up of multiple records

“Who is Who?”

Mr. Joseph Carbella55 Church StreetNew York, NY 10007Tel#: 212-693-5312DOB: 07/08/66SID#: 068588345DL#: 544 210 836

Mr. Joe JonesAPT 4909Bethesda, MD 20814Tel#: 978-365-6631DOB: 09/07/66

Mr. Joe Carbello1 Bourne StClinton MA 01510TEL#: 978-365-6631 DL#: 544 210 836DOB: 07/09/66

Mr. Joey Carbello555 Church AveNew York, NY 10070Tel#: 212-693-5312 DL#: 544 210 836

PPN#: 086588345Close match

Exact match

Page 18: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 18

Operations

Planning

Incident Management

Mapping

Single Sign On

Role Based

Personalization

Customization

Navigation

Security

People Finder

Live Feeds

Collaboration

Integration on the Glass

Page 19: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 19

Overview

Overview

Live chat

See cameras on map

Situational Awareness and Collaboration Real-time video with captions

Awareness

Live video feeds

Page 20: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 20

Service ServiceServiceServiceService

Service

ServiceDiscoveryServices

EnterpriseService

ManagementServices

Service

MessagingServices

Service

MediationServices

Service

CollaborationServices

(Video Conf, Chat,

Whiteboard etc.)

Service

SecurityServices

(Secure Access,TIM, TAM,

Single Sign On, DataPower)

Service

SOA Foundation – Accelerator

Common Enterprise Services Enabled by IBM SOA

Planning & Preparedness

Services(Virtual Agility

Corp)

Service

IncidentManagement

Services(NC4 Corp)

Service

Decision SupportServices

(ThoughtWebCorp)

Service

School PlanningServices

(SafePlans Corp)

Service

3D DigitalBuildingServices

(Archaio Corp)

Service

ISV Services

Geo Spatial& Situational Awareness

Services(ESRI Corp)

RadioConnectServices

(KITS Corp)

NetworkServices(CISCO Corp)

MassAlert

NotificationServices(Amatra Corp)

Radio&

SystemTechnologies

(MotorolaCorp)

Enterprise Service Bus

Page 21: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 21

Case Study: Child Abduction

With Crime Information Warehouse

4 year old male abducted while he was with a babysitter and his mother was at work. The former babysitter came by and took the child claiming she had permission from the mother.

Without Crime Information Warehouse

Full Court Press: Police establish a task force and initiate investigative canvasses

…the hours pass

Prior to initiating a full court press the squad detective calls for assistance.

The suspects id is entered in the system, which produces 7 names, 7 addresses, 3 DOB’s, & 6 SS numbers.

Investigators easily find common denominator and locate the child and the suspect.

Page 22: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 22

Connecting the Dots on 9 Holdups in 4 Boroughs - New York Times; November 12, 20069 robbery incidents across 4 boroughs …hold ups miles apart … a clever strategy

3 robbers; rental car,

2 chrome plated handguns,

Always a mapped escape route …

Faces covered with stockings and masks.

Citywide patterns across boroughs were hard to detect. “We’ve had incidents where it’s taken time, more time, to

identify a citywide pattern,” said Police Commissioner Raymond W. Kelly.

The Last Robbery: The men fled the CVS, an employee called 911,and an alert was sent out across the police radio.

Teams of detectives were waiting for them.

The robbers got tangled in their predictable pattern.“They charged us with all those robberies, but they caught us with one,” Mr. Belcon said.

Page 23: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 23

“…Comprehensive, highly relevant, instantaneous information… transforming the way we solve crimes…”

“…Shorty…”(a nickname)

RecentSummons

KnownAddresses

Relationships of Interest

ParoleesIn Vicinity

Suspect 1 Positive ID

Suspect 2 Positive ID Arrests & Linkage to Crimes

in Other Precincts

Previous Arrests

Information in context, in the hands of detectives, at the scene…

(a tatoo)

Page 24: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 24

Benefits

Operation Golden Guardian 2007(ARNORTH & State of California EMA)

Deploy response capabilities Locate resources Improve planning capabilities Develop training scenarios

Achieve interoperability and synchronization between 45 public agencies to include the US Army (ARNORTH) and the California State and Local Emergency Response Agencies and Command Centers.

Industry: Government Solution: Virtual Operations Center (VOC) Solution SBS Name:

Public Safety and Security Key Business Processes: Planning & Preparedness, Incident

Management & Collaboration Enterprise Services for State and County Wide Governments

Project Overview

Disaster Preparedness Challenge

Location: California State (4 Locations) Facts: San Diego, San Francisco, other System Facts: 200+ concurrent users responsible for

Government man-made and natural disaster management.

Both ARNORTH and California participating agencies wanted a common operating picture that showed a fused common operating picture across agency lines so that agencies could see the big picture - :On one sheet of music”.

Improve accuracy Provide timely decision support Develop contingency plans Manage field data in real time

Page 25: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 25

Benefits

Gauteng Disaster Management CenterGERIS Gauteng Emergency Information Resource Services

Deploy response capabilities Locate resources Improve planning capabilities Develop training scenarios

The Gauteng Province is exposed to an array of hazards that can threaten livelihoods and damage critical infrastructures. The Province will also be hosting the 2010 FIFA World Cup Games.

Industry: Government Solution: I3 Framework – Virtual Operations

Center (VOC) Solution SBS Name: Public Safety and Security

Key Business Processes: Planning & Preparedness, Incident Management & Collaboration Enterprise Services for State and County Wide Governments

Project Overview

Business Challenge

South Africa

Location: South Africa, Province of Gauteng Facts: Largest cities Johannesburg and Pretoria, Population

9,688,100 System Facts: 200 concurrent users responsible for Government

man-made and natural disaster management.

The local government needed a real time Common Operating Picture and interoperability for its command center and officers in the field to prepare for emergencies and support emergency operations

Improve accuracy Provide timely decision support Develop contingency plans Manage field data in real time

Page 26: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 26

Benefits

State of MissouriMERIS Missouri Emergency Resource Information System

Event management regardless of scope and scale

A common operating picture Support for private and

public resource and asset management functions

Integrated credentialing tools

Minimization of redundant data input

Public Safety Needs: Incident Management, Resource Tracking, Communications, Asset Request Processing for:

Local City Public Safety Officials Local County Public Safety Officials All State Agencies Private Support Organizations All Hazards & Disciplines: Police, Fire Emergency, Medical,

HAZMAT, Intelligence, Public Health & Pandemic

Industry: Government Solution: I3 Framework – Virtual Operations

Center (VOC) Solution SBS Name: Public Safety and Security

Key Business Processes: Planning & Preparedness, Incident Management & Collaboration Enterprise Services for State and County Wide Governments

Project Overview

Business Challenge

United States

Location: United States, State of Missouri Facts: Population 5,842,713. 114 counties and one independent

city (St Louis). System Facts: 400-600 concurrent Users, High Availability -

Clustered Failover Design, NIMS compliant

Geo-mapping options with a network link to a GIS data warehouse encompassing geo-data and aerial photography of the entire state

Templates for planning, operations, resources, finance and intelligence functions

Reports for current situation to include real-time weather and weather forecasting tools

Page 27: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 27

Best Practices and Lessons Learned

Networked security technologies significantly improve operational efficiency and reduce cost The days of standalone solutions are history

The business requirements and the existing assets and infrastructure should drive the design Re-use or additional functionality that can be done with current assets Integration and interoperability are operational necessities

Think across organizational boundaries With what existing systems will you need to integrate? SOA? With what other agencies or systems will you need to share information?

Think long term There will be changes; how can you prepare so that they can be made

with minimal impact on your operations? Who will host? How will the systems be supported and maintained and at what cost?

Page 28: Disaster Risk Management in the Information Age

Transforming the Business of Public Safety & Security© 2008 IBM Corporation

Slide 28

Additional Information

citizencorps.blogspot.com

www-03.ibm.com/industries/government/doc/jsp/indseg/all/f/index.jsp?re=gihome67gov

Andrew S. LevyIBM Corporate Service Corps Fellow

[email protected]

Reaching over 13,000 people in

over 1,400 cities in over 75 countries in

12 months.