Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

DHS, FEMA Test iPad Emergency-Response Tool

The software helps train emergency responders by providing models that display what the scene of a disaster may look like.

Government Innovators
Slideshow: Government Innovators
(clickimage for larger view and for full slideshow)
The Federal Emergency Management Agency (FEMA) is testing a new iPad application that helps train emergency first responders by allowing them to visualize what the scene of a disaster may look like following a catastrophic event.

FEMA officials and first responders tested the software--called Standard Unified Modeling, Mapping, and Integration Toolkit or SUMMIT--during the agency's National Level Exercise 2011 last week, according to Sandia National Laboratories, which developed the tool.

The tool is aimed at giving first responders a better idea of what kind of environment they will be facing before they enter a disaster scene--such as a bombed building--so they can learn to make better decisions, an emergency management official who took part in the exercise said in a statement.

"By having a graphical view of damaged areas, it's much easier to comprehend what's going on in the exercise and thus make smarter, firmer decisions," said David Moore, director of emergency management for Craighead County in Arkansas, one of the regions that participated in the pilot exercise.

The Department of Homeland Security's (DHS's) Science and Technology Directorate (S&T) provided funding and direction to build the software, while FEMA's National Exercise and Simulation Center provided support.

During the training exercise, first responders used SUMMIT on iPads to input details on buildings, infrastructure, and casualties to create models and calculations, while others in a control center used it in a more traditional desktop and screen environment to get a full visualization of the scene, according to Sandia. Working together with the visualization information allowed for better collaboration during the exercise, according to Sandia.

Unlike some modeling tools, SUMMIT provides a more user-friendly way to create visualizations that were specific to the exercises to help prepare "responders to work within a rapidly evolving, diverse, and multijurisdictional environment--often with limited or quickly changing situational understanding," Jalal Mapar, the DHS/S&T program manager who oversees the SUMMIT program, said in a statement. He said this has traditionally been a "major challenge" for responders.

Eventually, FEMA plans to make SUMMIT a standard tool for training exercises, Mapar added.

Federal agencies are increasingly using new applications on mobile devices such as iPads, iPhones, and other smartphones to more creatively use technology and give personnel new tools for performing their duties.

For example, the Bureau of Alcohol, Tobacco and Firearms (ATF) recently tested iPhones and other smartphones to let agents in the field monitor surveillance video taken by IP cameras of drug trafficking and other crimes. The Army, too, is testing the use of tactical applications for soldiers in the field that they access on smartphones.

Join us for GovCloud 2011, a day-long event where IT professionals in federal, state, and local government will develop a deeper understanding of cloud options. Register now.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...