Search and Find
Service
Foreword
5
Acknowledgement
6
Contents
7
Contributors
9
About the Editors
11
1 The Role of the Private Sector in Homeland Security
12
Introduction
12
Background
13
Restructuring Public Emergency Services
15
Engaging the Private Sector in Homeland Security
18
Establishing Regulated Insurance Programs
22
Employing Technology
26
Conclusions
29
References
31
2 Creating the Boston Medical Reserve Corps
33
Introduction
33
The Boston Medical Reserve Corps
34
Volunteer Recruitment
34
Basic Training
35
Leadership Training
36
Lectures to Maintain Interest of Volunteers
37
Exercises
38
Support for Non-CRI Events
39
Future
40
3 The Hierarchy of Emergency Preparedness
41
Local Threats
42
The Hierarchy of Emergency Preparation
42
Individual Cooperation
43
Organizational Cooperation
44
A Regional Model
45
Local Government Cooperation
46
Technological Cooperation
47
Conclusion
49
4 Border Security and State Safety and Security: Addressing Common Agendas
51
Introduction
51
Safeguarding the Borders
53
State and Local Cooperation on the Southern Border
53
Volunteer Groups and State Defense Forces
55
On the Northern Border
56
Infrastructure Improvement
57
Interior Enforcement
58
Conclusion
60
Notes
60
5 Lessons Learned from the 2004 Atlantic Hurricane Season: How This Highly Active Year Helped Jacksonville, Florida, Build a Better Emergency Response System
63
Development of Standard Operating Guidelines for Internal and External Communication Procedures
65
Improving the Management Procedures of the Special Needs Database
66
Development of Policy and Guidelines Outlining Expectations of FEMA and Mutual Aid Reimbursements
67
Development of a Duval County Debris Management Plan
68
Development of Standard Operating Guidelines for Meeting Human Needs
69
Mandatory Emergency Operations Center Training
70
Conclusion
70
6 Disaster Management: Privatization as a Viable Alternative
71
The Ideal Disaster Organization
71
A Critical Introspection
72
A Complementary Path: Privatization
72
Privatized Disaster Market
73
Private Market Attractions
73
People Power
73
A Case Study in Israel
74
Ready to Pay
74
Quality Services
75
Family Safety Net
75
Seeking Information
76
Who Wants to Pay?
76
Are the Rich Safer?
77
A Social Decision
77
Organizational Adaptation
78
Sharing Resources
78
Manpower Reserves
78
NGO Volunteers
79
Flexibility and Change
79
Pros and Cons
79
Notes
80
References
81
7 Caring for the Evacuees from Hurricane Katrina and Rita
82
Introduction
82
What Happened
83
Lessons Learned
85
Carefully Defining Goals
85
Break Big Jobs Down into Manageable Tasks and Empower Those Assigned the Task to Make Decisions
86
Enlist the Most Competent People in Organizations for each Task
86
Strict Accountability
87
Improvise and Use What Works
87
8 Sheltering and Evacuating from Hurricanes Katrina and Rita
89
Contributing Factors
93
Managerial Strategies
93
Technological Strategies
94
In Conclusion
94
9 Local Government Contingency Planning for Public Security and Public Safety Innovative and Remedial Efforts
95
Introduction
95
Innovative Security and Safety Approaches Regional Logistics Center
96
Emergency Response and Recovery Gap
96
Enhance Logistics Capabilities
98
Defining the Role of an RLC
99
A Public--Private Partnership Approach
100
Innovative Security and Safety Approaches Inter-metropolitan Municipal Mutual Aid Agreements
100
Contingency Planning
103
Reverse 911
103
Evacuation Transportation Capacity
103
Coordinated Regional Evacuation Planning
104
Role of the Mass Media
104
Hosting Emergency Evacuees
105
Emergency Planning Scale
105
10 Technological and Regional Cooperation Strategies: Securing the City and Port of Oakland, California
107
The Port of Oakland
109
Protecting the Port Infrastructure
109
Interagency Cooperation and Collaboration
110
Real Life Scenario: The M/V COSCO BUSAN
111
Regional Collaboration Efforts
113
Regional Exercises and Skill Building
114
Maritime Interdiction Training
115
Real-Life Scenario: I-80at I-580/I-880 Freeway Deck Collapse
116
Real-Life Scenarios: Loma Prieta Earthquake and OaklandHills Fire
116
Enabling Technologies
118
Interoperable Communications
118
Data Sharing, Reporting, and Analysis Strategies
119
Acoustic Sensor and Image-Processing Technologies
120
Surveillance Camera Technologies
120
Oaklands Citywide Broadband Wireless Initiative
121
Vision for the Future Resources and Funding
121
Port and City of Oakland Integrated Monitoring and Coordination System
121
Contributors
124
Notes
124
11 Innovative Anti-terror Information Sharing: Marylands Federal, State, and Local Partnership Model
125
Introduction
125
Partnerships Produce Results
125
Fusion Centers: A New Approach to Information Sharing
126
What is a Fusion Center?
126
What Do Fusions Centers Do?
127
Case Study: Part 1
128
London, England -- August 2006
128
An Overview of the MCAC
128
Brief History
128
Mission
129
Organizational Structure
130
The Watch Section
130
The Strategic Analysis Section
131
The Role of the Public
131
Products
132
Governance and Leadership
133
Case Study: Part 2
133
Baltimore, Maryland -- October 2006
134
The Value of the MCACs Information-Sharing Function
134
Case Study: Part 3
135
Conclusion
136
Notes
136
12 Public Safety and Homeland Security Solutions: An Evolution of Technology and Policy
138
Pennsylvanias Public Safety Continuum
138
The Starting Point Justice Silos
139
Technology and Policy Factors -- Justice Silos
139
Significant Event 1994 Pennsylvania Gubernatorial Race
140
Pennsylvanias Integrated Justice
140
Background
140
Technology and Policy Factors -- Integrated Justice
141
Pennsylvania--s Integrated Justice Initiative -- JNET
142
JNET Technology Advances
143
JNET Service Expansion
143
JNET Data Standards -- Proprietary, GJXDM, and NIEM
143
JNET Business Reference Model
145
JNET Governance
145
Significant Events September 11 and Katrina
146
Pennsylvanias Homeland Security
146
Background
146
Technology and Policy Factors -- Homeland Security
147
Pennsylvania Homeland Security Initiatives
148
Governance
148
The Fusion Environment
149
Challenges
149
Pennsylvania--s Fusion Starting Point -- PaCIC
149
Anticipated Challenges
150
Fusion Data Standards
150
Fusion Business Reference Model
150
Fusion Alignment
151
Identity Protection and Management
152
Continuity of Government
152
Planning for the Future
153
Device Convergence
153
IT Commoditization
153
Conclusions -- From Technology to Policy
154
Glossary
155
13 Utilizing Technology Within the Delaware Information and Analysis Center
156
Introduction
156
Concept and Development of the Delaware Information and Analysis Center (DIAC)
157
Technological Systems
158
Current Status of the DIAC
161
Information Resources
163
Products
163
Privacy and Civil Liberties
163
Conclusion
163
References
164
14 From Curiosity to Collaboration: Leveraging Technology to Improve Situational Awareness
165
Business Issues and Background
166
EVOC and Its Supporting Technologies
169
Case Study: Windy Ridge Wildfire
174
Case Study: Golden Guardian 2007
176
Future Plans for EVOC
178
Conclusion
181
Notes
182
15 How a Midwestern Digital City Serves and Protects the Public
183
One Villages Response
184
The New Surveillance
185
Praise from Constituents
186
Taking the Next Step
187
Introducing Red Light Technology
187
More Plans for Technology
189
What We Have Learned
189
16 Hurricanes and Modern Communications Infrastructure
191
Hurricane Experience
192
Actions Taken
194
Public Safety Radio System
194
Data Network
194
Telephone System
195
Amateur Radio
195
Conclusion
195
17 The First Line of Defense: Cities Using Technology in Homeland Defense
196
About Providence
197
MESH Network
198
How It Works
199
What Precipitated the Move to MESH
199
The Comparison Between Old and New systems
200
18 Full Interoperability for All South Dakota Public Safety
202
Several Radio Frequencies in Use
202
Agencies Cannot Talk When Most Needed
203
Legislature Took Action in 1999
203
Funding Found
204
Motorolas VHF Solution Best for South Dakota
204
One Frequency Ensures a Smooth Transition to the Statewide System
204
Digital Radios Outperformed Analog Radios
204
Data, Not Just Voice, Travels the System
205
Trunking Technology Ensures Optimal System Performance
205
Radio System Coverage Best It Can Be
206
Digital Radios Act Like Computers
207
Radio System Works Like Telephone System
208
State Will Maintain a State-of-the-Art Radio System
208
Talk Groups are Facilitated
209
New Radios Can Be Used on Existing Radio Systems
209
State and Locals Can Make Radio System Succeed
209
Easier, Least Costly Migration Path
209
State Continues to Expand System
210
One-of-a-Kind System
210
19 Evolutionary Planning for the Technology Revolution
211
Introduction
211
Background
212
Plan, Plan, Plan
212
The Rebooted LEADS Plan
214
Planning Produces Results
217
Managing the Winds of Change
218
Planning for the Future
219
20 History of Regional Unified and Integrated Public Safety and Public Service Communication and Transportation Systems
221
Background and Statement of the Problem
221
Forming the Coalition
222
Details of the Individual Integrated Projects
223
Regional Radio System
223
State Radio Coalition
224
Computer-Aided Dispatch
225
Mobile Data Computer
227
Combined Transportation, Emergency and Communications Center (CTECC)
229
Regional System Operations
231
Regional System Yields Benefits
233
21 Interoperability in the City of Tampa: A Partnership with the Department of Homeland Security
236
Design of the Regional Technology Program
238
Implementation
240
Conclusion
242
22 Capital Connections: Washingtons Public Safety Communications Suite
243
Introduction
243
Getting It Together: A Comprehensive Public Safety Communications Suite
244
Getting Over the Hurdles: Obstacles and Challenges
252
Conclusion
254
23 Information, Leadership and Decisiveness, All in One Room
255
Introduction
255
Our Joint Operations Center
256
Consolidated Response a Growing Tradition
257
One Night in the Joint Operations Center
259
The Extended Joint Operations Center
260
Conclusion
261
24 Beyond an Information Technology Approach to Continuity of Operations: The Commonwealth of Virginia Story
262
Introduction
263
25 The Soft Stuff is Still the Hard Stuff
270
Build the Governance Scaffold
272
Understanding the Strategic Interplay of People, Process, and Technology
276
People
278
Technology
280
Process
282
In Conclusion
284
Appendix: Primer in Security Technologies
285
Index
287
All prices incl. VAT