There are four us who are enrolled at Harvard's National Public Leadership Institute and we are interested in getting feedback on where R&D investments should be made to further the effectiveness of Emergency Operations Centers. We would like to know what technologies are important to Emergency Managers. Please take our survey and we'll post the findings back in this forum so you can react to it using idea scale . ...more »
Open Ideation Forum
Enable the Decision Maker:
Actionable Information at the Speed of Thought
Decision makers, analysts and operators can benefit when the most relevant authorized data sets are transformed into actionable information. In an ideal world... technical capabilities such as predictive analytics, risk analysis, and modeling and simulation systems can be combined to enable critical decisions to be made. Especially in the face of dynamic environments involving chemical, biological, radiological, or nuclear incidents, accurate, credible, and context-based information will empower the aware decision maker to take actions to improve critical outcomes.
As the Internet of Things and emerging platforms provide new Big Data opportunities, decision makers will face greater challenges with identifying and managing essential information needed to mitigate risk and effectively respond to emergencies. Evolving data assets and ecosystems must prioritize data and information credibility, privacy, and security with appropriate policies, procedures, and methods for evaluation.
Considering these factors, how can we work together to leverage Big Data in the following areas:
Additionally, how can we best address cross-cutting issues such as data credibility, privacy, and security?
Assessing privacy risks is obviously challenging and currently an incomplete dark art. One place to start is defining a calculus for privacy with an emphasis on being able to assess risks (risk of unwarranted fact disclosure, risk of identification [assurance of anonymity], etc.) At the very least, such a calculus would formalize some of the heuristics currently in use.
Ports of Entry – Integrated Lane of the Future Currently, different offices in CBP, GSA, DNDO, Agriculture, and many more all vie for real estate in primary lanes (as opposed to secondary screening lanes) at CBP Ports of Entry (POE) for some sort of detection or processing technology to serve the overall CBP mission. A single lane can have multiple and disparate technology installed such as Radiation Portal Monitors, ...more »
DHS is a young agency, whose disparate parts have complex legacy systems for storing and sharing information. To achieve its full potential all decision makers at every level should have access to the data that they need, and they must have confidence that this is the same data that their subordinates and their superiors are seeing. This is technically possible, but it is a disruptive departure from the hierarchical and ...more »
Gone are the days of large capital investments in IT Infrastructure and the need for customized physical devices solely acquired for incident data collection. Cloud Computing, Just In Time Delivery, and Bring Your Own Device (BYOD) have virtually eliminated the need for wasteful spending on specific use devices that sit on shelves collecting dust and responders who have never operated them. “Your cell phone has more computing ...more »
The Internet of Things recognizes that everything can be connected. This may make things more complicated because there will be that much more data, not to mention more risk associated with dependencies on linked data. The Internet of Autonomous Things (IoAT) suggests the potential for more intelligent nodes existing at the edge (where the real data lives). If situations can be responded to at the edge, when they are ...more »
Off all the spokes of the CBRNE wheel, the "E" category is the one that is often exercised in a pre-incident scenario where the "CBRN" categories are often exercised in a post-incident scenario. But, across the country, CBRNE responses most often venture into the explosives-related realm due to bomb threats, suspicious items, discovered components, bomb-making materials discovery, or post-blast analysis. I believe DHS ...more »
EO 13636 requires all agencies to implement a Risk Management Framework in the acquisition process for all IT intensive programs. Much of the work to date has only focused on Cyber risks, and not mission execution risk. With Federal IT programs failing at a average rate of 70%, implementability happens to be a much greater risk to the mission. This is why the Interop. Clearinghouse and IT Acquisition Advisory Council ...more »
Are you open to a new approach to readiness programs? Findings from unparalleled 10+ yr study favor a new model for readiness. The study included market research, mission gap analysis, time-motion, technical feasibility, field trial, focus group and other activities. It used a metric driven methodology and considered the mission needs, interests and roles of all 8 major categories of stakeholders in the nation's emergency ...more »