First responders gear up

Perhaps the pace is not as swift as some would like, but a host of interesting and valuable new technologies is making its way from the development labs into the hands of those who work on the front lines of homeland security.

Among the technologies are sophisticated video systems that can alert security officials to suspicious activity, such as a bag left unattended at an airport terminal or a person trespassing in a secure area. Multimedia-equipped handheld computers enable first responders to survey a disaster scene with real-time video or see maps showing potential dangers such as a nearby chemical storage tank. And emergency management teams can carry mobile networks to communicate with one another even when the local network infrastructure gets knocked out.

In this special report, we take a closer look at the latest developments in those fields and offer numerous examples of how agencies are already putting products to work — or laying the groundwork to use them in the

future.

One aspect of the development and deployment of homeland security technologies that bodes well for their success — besides the obvious value to those who use them — is the strong opportunity for synergy among them. For example, advances that make the transmission and management of digital video more efficient for surveillance systems can play a role in an application that beams video to a fire captain's handheld computer. Likewise, the mobile networks that enable first responders to communicate in any locale can also carry the map data that warns them about nearby

hazards.

Another plus is that the needs driving the market for these technologies are not limited to the homeland security arena of firefighters, police and emergency management officials. The same tools are equally valuable to military forces, who, like first responders, also require mobile, resilient technology that allows them to communicate and access data in the field. This creates an excellent opportunity for development efforts designed for one community to be tapped by another. And this dual use creates a bigger market for the products and encourages more companies to invest in them.

As developers design homeland security tools they should keep in mind the special environments in which the products will be used. Many lessons have been learned in the past few years about wireless networks and the now-common personal digital assistants.

For example, emergency workers need a way to input information into handheld devices that is quick and nearly foolproof. Voice-recognition capabilities can be useful here. Also, the amount of information presented on a device, which should vary according to the role of the person using it, also has to be managed carefully so that users are not distracted or overwhelmed by data.

Testing products in the field and training users are also important parts of the process. One story in this report shows how agencies are using disaster simulations and other readiness exercises to test the new equipment's effectiveness and start the necessary training. These exercises are necessary because a real disaster scene, where lives are at stake, is not an ideal place for on-the-job training.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group