Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

CCR Summit magazine 2018

Public Safety & Homeland Security Conference Magazine
10 & 11 October 2018

  • Login to see the comments

  • Be the first to like this

CCR Summit magazine 2018

  1. 1. Public Safety & Homeland Security Conference Magazine CCR SUMMIT 2018 10 & 11 October 2018
  2. 2. 3 | CCR SUMMIT 2019 - SAVE THE DATE PUBLIC SAFETY & HOMELAND SECURITY THE LARGEST MultiAGENCY NETWORK IN NORTH-WEST EUROPE RB&W provides its members with comprehensive international market intelligence, dedicated project communication and Safety & Security concept development connecting all key players striving to enhance multi-agency cooperation and communication. As an independent provider of research and analysis, RB&W monitors and analyses on-going market developments and trends in both processes and technology. CommuniCation & EvEnts Always be connected with RB&W’s influential means of communica- tion with leading events like the CCR Summit, weekly newsletters, in-depth sessions and strategic trends & analysis papers. Community Direct access to a closed community (Government exclusive) of more than 3.500 international multi-agency and multi-level Public Safety & National Security stakeholders. Use RB&W’s global work visits to experience successful international government projects first at hand. tEChnology In close co-operation with the leading industry suppliers RB&W makes sure you are always on top of the latest technologies & deve- lopments. By hosting user groups and industry sessions RB&W is an independent research partner for technology solutions and projects. lEvEragE RB&W’s independent advocacy creates strong leverage for local and regional government projects and programs by putting your project or program on the national and international agenda. 4 | RB&W 5 | THE NEW DEFINITION FOR SAFETY AND RESILLIENCE 8 | HET NIEUWE MELDEN 11 | UNISCOPE - ALL-IN-ONE SYSTEM FOR COMPLETE CLARITY 13 | CASE STUDY: APEX SINGAPORE 16 | REMARKABLE PRIVATE INNOVATIONS IN PUBLIC SAFETY SPONSOR PARTNERS 2018 CCR SUMMIT 2018 INDEX
  3. 3. Beste CCR Summit bezoeker, Mede dankzij uw enthousiaste deelname was de CCR Summit 2018 afgelopen 10 en 11 oktober wederom een succes. Deze 12de editie vond bij uitzondering plaats aan het begin van de zomer in plaats van het begin van oktober. Dat hebben we geweten! Naast een prachtig programma was het ook schitterend weer. Ruim 400 mensen hebben dan ook in Bovendonk kunnen genieten van deze speciale zomer-editie. Voor u ligt het CCR Summit Conference Magazine. Hierin vindt u de achterliggende informatie die tijdens de sessies gepresenteerd en gedemonstreerd is. Op veler verzoek is bij alle onderwerpen ook de contactinformatie opgenomen, zodat u voor meer informatie terecht kunt bij de juiste contactpersonen. In verband met het soms meer besloten karakter van de inhoud zijn niet alle sessies zijn in dit Magazine opgenomen. Indien u over deze sessies uit het programma meer informatie wenst neemt u dan vooral contact op met ons via Ook in 2019 vindt de CCR Summit weer plaats in oktober. Houdt u daarom de data 9 en 10 oktober 2019 gereserveerd in uw agenda voor de 13de editie van de CCR Summit.Het komende jaar gaan we weer, samen met u, hard aan de slag om de actuele onderwerpen, projecten en programma’s van 2019 op de agenda van de CCR Summit te plaatsen. Graag willen we u bedanken voor uw deelname aan de CCR Summit, maar natuurlijk ook alle sprekers en organisaties zonder wie de CCR Summit niet mogelijk zou zijn. Bovenal gaat onze dank uit naar Generaal Majoor Andree Peperkoorn, onder wiens bezielende leiding de de 2018-editie vorm gekregen heeft. Wij kijken ernaar uit om u ook in 2019 op 9 en 10 oktober in als onze gast in Bovendonk te moge verwelkomen. CCR SUMMIT 2019 - SAVE THE DATE 9 & 10 October 2019 CCR SUMMIT 2019 12th Annual International Public Safety & Homeland Security Conference De CCR Summit wordt mede mogelijk gemaakt door: Sibel Sebüktekin & Marcel Franken RB&W SAVE THE DATE: 9 & 10 OKTOBER 2019
  4. 4. PUBLIC SAFETY & HOMELAND SECURITY THE LARGEST MultiAGENCY NETWORK IN NORTH-WEST EUROPE RB&W provides its members with comprehensive international market intelligence, dedicated project communication and Safety & Security concept development connecting all key players striving to enhance multi-agency cooperation and communication. As an independent provider of research and analysis, RB&W monitors and analyses on-going market developments and trends in both processes and technology. CommuniCation & EvEnts Always be connected with RB&W’s influential means of communica- tion with leading events like the CCR Summit, weekly newsletters, in-depth sessions and strategic trends & analysis papers. Community Direct access to a closed community (Government exclusive) of more than 3.500 international multi-agency and multi-level Public Safety & National Security stakeholders. Use RB&W’s global work visits to experience successful international government projects first at hand. tEChnology In close co-operation with the leading industry suppliers RB&W makes sure you are always on top of the latest technologies & deve- lopments. By hosting user groups and industry sessions RB&W is an independent research partner for technology solutions and projects. lEvEragE RB&W’s independent advocacy creates strong leverage for local and regional government projects and programs by putting your project or program on the national and international agenda.
  5. 5. Insta Response™ Virtual Control Room: The New Definition for Safety and Resilience The cyclone Tapani (known as cyclone Dagmar in other Nordic countries) hit Finland on Christmas day 2011. The storm was estimated to be the worst in Finland in 10 years, and it caused approximately 60 million Euro damages to power companies as damage claims and repair costs, approximately 70 million Euro compensations claims to insurance companies, a great deal of distress – and death of one citizen. The storm caused a surge of calls from worried citizens calling in for assistance to non-emergency situations like fallen trees blocking passageways as well as real, life- threatening situations. Only 50% of the incoming calls were handled, while queuing time was about 4 minutes at worst compared to average of 10 seconds. Emergency Response Centers (ERC) in southern parts of Finland were under the biggest stress; the Lohja ERC being the smallest in Finland by the time suffered the most, being unable to serve citizens because of the call congestion and overload of the old IT-system. Studies and reports related to the Emergency Response Center operations during the storm revealed how inadequate the old Emergency Response Center IT-solution was to handle such a situation in terms of lacking co-operation between different ERC’s. Even the ERC’s in central and northern parts of Finland were not overloaded, they were not able to support ERC’s in southern parts of Finland. This story describes what Insta Response™ Virtual Control Room is, how it helps Emergency Response Centers to survive from scenarios such as the one described above and four other reasons why you should not settle with anything less when the lives of your citizens are at stake. What is a Virtual Control Room? The Virtual Control Room is one of the many groundbreaking features of Insta Response™ Emergency Response Center Solution that makes it unique compared to any other solution in the market. The Virtual Control Room allows multiple physical locations to form a single, logical control room that allows free seating and removes dependency on location and time from emergency operations. The Virtual Control Room can be used within a single Emergency Responder Organization like the Police, Emergency Medical Services or Fire & Rescue – or in nationwide, multi-authority deployment where it unleashes its full potential. The New Definition for Safety and Resilience Cyclone Tapani in Finland on Christmas Day 2011 During the peak hour, Emergency Response Centers received 3.584 calls and dispatched 535 tasks to the first responders. Only 50% of the calls were handled, while queuing time was about 4 minutes at worst. Virtual Control Room #1 Global contact queue and role based call offering #2 Unified incident assessment and tools to define and manage the smart standard operating procedures #3 Local dispatch rules assisted by the system
  6. 6. Unlike other solutions in the market, original call orders and timeline are always preserved and there is absolutely no need for call rerouting outside of the system not even in the peak load situations. No prior local knowledge or experience is required from the operators as the system supports and guides the operator to achieve optimal results regardless of their physical location. Insta Response™ Virtual Control Room features »» 1 Local congestion prevention The Insta Response™ Virtual Control Room provides a natural, built-in for preventing local congestion, any operator, in any place and at any time can handle incidents happening in anywhere. »» 2 Disaster recovery In case the ERC is lost due to communications failure, natural disaster or a terrorist attack, any other physical location can take over without any delay. »» 3 Optimizing operations Shutting down some control room for low demand hours (e.g. weekday nights) is just the matter of switching the roles – no administrative tasks are required. »» 4 Embrace differences One size does not fit all, especially regarding nationwide multi-authority. The virtual control room enables different control rooms from different regions or disciplines using different processes to collaborate and share common understanding of task at the hand. Insta DefSec Contact For more information please contact Seppo Merikoski via The New Definition for Safety and Resilience
  7. 7. |
  8. 8. Visie vormen en experimenteren Visievormend en experimenteel onderzoek is de kern van de aanpak van Het Nieuwe Melden. Met visievormend onderzoek brengen we de huidige trends en transities in kaart en bedenken samen met de verschillende stakeholders in het meldkamerdomein hoe hier effectief op ingespeeld kan worden. Met experimenten onderzoeken we de invloed van technologische ontwikkelingen op de meldkamer en het meldproces. We beantwoorden vragen als: “Hoe sturen we hulpverleners voorbereid op weg met big data?” of “Welke input kunnen sensoren leveren aan de meldkamer?”. In het programma werken we nauw samen met de LMS. De LMS, de ‘scale-up’ van het programma Landelijke Meldkamer Organisatie, is het nieuwe organisatieonderdeel van de politie en werkt van en voor alle partijen in het meldkamerdomein. Eén van de belangrijke opdrachten van de LMS is het moderniseren en vernieuwen van meldkamerprocessen, -systemen en –organisatie, onder andere met sensoren, datascience en netcentrisch opereren. In samenwerking met het meldkamerveld kunnen we onderzoek doen met impact – waarin de eindgebruiker wordt meegenomen. We vertellen graag meer over de trends en transities en lichten twee recente experimenten toe. Trends Er zijn verschillende trends in kaart gebracht die van invloed zijn op het meldproces: Smart community We leven in een smart community, waarin informatie- uitwisseling explosief toeneemt en mensen altijd en overal met elkaar verbonden zijn. Dit betekent dat er meer kanalen komen via welke burgers meldingen kunnen of willen doen. In deze genetwerkte samenleving is iedereen steeds meer altijd en overal met elkaar verbonden. Daarnaast wordt burgerparticipatie, bijvoorbeeld via sociale media, gemakkelijker. Vermenging digitale en werkelijke wereld De digitale en werkelijke wereld versmelten, waarbij er een toenemende afhankelijkheid is van digitale HET NIEUWE MELDEN De wereld verandert continu. Technologische ontwikkelingen en nieuwe toepassingen daarvan in de maatschappij volgen elkaar in rap tempo op. Nieuwe communicatiemiddelen tussen mensen onderling, met bedrijven en de overheid zorgen voor nieuwe mogelijkheden voor het melden van ongevallen en noodsituaties. Het ministerie van Justitie en Veiligheid, de hulpverleningsdiensten (in de vorm van de LMS, de Landelijke Meldkamer Samenwerking) en TNO onderzoeken binnen het programma ‘Het Nieuwe Melden’ samen hoe de overheid zich slimmer kan organiseren en beter gebruik kan maken van de kansen die nieuwe communicatievormen bieden voor het melden van veiligheidsincidenten. De kennis die deze onderzoeken oplevert, draagt eraan bij om nu en in de toekomst burgers in nood sneller en efficiënter te helpen en de ambulancezorg, brandweer, marechaussee en politie beter te faciliteren bij hulpverlening en bestrijding van crisis en rampen.
  9. 9. systemen. De digitale wereld is in staat tot steeds betere nabootsing of zelfs ‘verbetering’ van de echte wereld. Denk hierbij bijvoorbeeld aan Augmented Reality of Mens Machine Interfaces. Activiteiten en systemen in het digitale domein krijgen daarmee steeds meer invloed op onze activiteiten in de fysieke wereld. Digitale veiligheid zal daarmee steeds meer impact hebben op de fysieke veiligheid van de burger. Beeldcultuur We leven in een beeldcultuur, waar de technologie in een stroomversnelling zit en de behoefte aan beeld steeds groter wordt. De impact van deze trend is momenteel al voelbaar in de meldkamers, die steeds vaker toegang hebben tot (live-)beelden uit de regio. Bij dit toenemende aanbod moet rekening gehouden worden met de regie – voegt het beeld nog wat toe aan reeds ontvangen informatie en in hoeverre draagt het bij aan snellere hulpverlening? Daarnaast is het van belang om de impact op de centralist te duiden; beelden kunnen schokkender zijn of juist een melding afzwakken. Autonome besluitvorming Er is steeds meer sprake van autonome besluitvorming op basis van data. Wanneer er geen gebruik gemaakt wordt van de toenemende input van data ten behoeve van veiligheid zal de burger zich afvragen waarom niet. Aan de andere kant moet er ook geen overload zijn aan data of beslismodellen die het hulpverleningsproces kunnen verstoren. Digital trust We worden ons bewust van de keerzijde van het opslaan en transporteren van data, mede omdat de kwetsbaarheid voor digitale veiligheidsincidenten groter wordt en het onderscheid tussen nep en echt steeds moeilijker. Privacy zal soms opgegeven moeten worden ten behoeve van veiligheid, maar waar ligt deze grens? Transparantie over welke gegevens waarvoor worden gebruikt blijkt hierin een belangrijke factor. Daarnaast moeten nieuwe databronnen (zoals beeld) die aangewend worden voor besluitvorming betrouwbaar zijn. Smarter world We leven in een smarter world, waarin ‘dingen’ steeds slimmer worden en mens-machine interfaces steeds intuïtiever. Veiligheidsdiensten moeten dus steeds beter kunnen communiceren met dingen in plaats van mensen. Op deze manier zouden slimme voer-, vaar- en vliegtuigen of gebouwen zelf meldingen kunnen doen. Transities Om in te spelen op de hierboven beschreven trends en ontwikkelingen zijn verschillende transities voor de meldkamer gedefinieerd: van beperkte gegevens naar relevante multimediale informatie, van volgend naar voorspellend, van menselijke naar kunstmatige intelligentie, van begrensd naar virtueel grenzeloos, van intern hiërarchisch naar extern genetwerkt, van blind vertrouwen naar transparantie. Aan deze transities worden samen met stakeholders, zoals de verschillende kolommen en het ministerie, actierichtingen gedefinieerd die eind dit jaar gepubliceerd zullen worden. HET NIEUWE MELDEN Transities op de weg naar Het Nieuwe Melden
  10. 10. Beeld in de meldkamer “Ja mevrouw, ik zie het…!” Een nieuw geluid op de 112-meldkamer tijdens het experiment ‘Melden met beeld’. In oktober is een onderzoek uitgevoerd in de Meldkamers Noord-Nederland en Noord- Holland om te onderzoeken wat de invloed is van het gebruik van beelden bij 112-meldingen. Beeld kan namelijk het proces versnellen en de juistheid van informatie vergroten maar mogelijk ook tijd kosten om te interpreteren en afleiden van wat wordt gezegd. Centralisten van verschillende disciplines deden mee aan twee experimenten. Het eerste (quasi) experiment richtte zich op het effect van beeld op het proces en met name op de snelheid, juistheid en volledigheid van de verwerkte informatie. Elke centralist handelde tijdens het experiment acht cases af waar tijdens de intake beeldmateriaal aan werd toegevoegd. Op die manier konden onderzoekers van TNO de prestaties van de centralisten die eerder de cases hebben afgehandeld zonder beeldmateriaal worden vergeleken met de prestaties van de centralisten die wel beeldmateriaal kregen aangeboden. Het tweede experiment was verkennend van aard en richtte zich op de emotionele en cognitieve impact van beeld op de centralist. De eerste conclusies en inzichten van de experimenten worden nu verwerkt en later dit jaar gepresenteerd. Want, de toekomst komt in beeld. Voorspellen van meldingen Het voorspellen van de spoedvraag is een ander voorbeeld van een experiment, dit keer in samenwerking met de meldkamer Rotterdam. In dit experiment wordt een algoritme ontwikkelt om 112-meldingen te voorspellen op basis van historische en live bronnen. Verschillende databronnen kunnen gebruikt worden door zogeheten ‘machine learning algoritmes’ om trends te ontdekken en voorspellingen te doen. Politie, brandweer en ambulance maken al gebruik van voorspellende algoritmes om te bepalen waar de kans op incidenten het grootst is. Maar deze algoritmes zijn nu nog voornamelijk gebaseerd op historische incident data. De vraag is of andere (live) databronnen zoals weer en verkeer kunnen worden benut om beter te kunnen anticiperen op de spoedvraag. Deze vraag wordt op het moment van schrijven getoetst waarbij experts van politie, brandweer en TNO samenwerken om voor dit probleem werkbare oplossingen te realiseren. Conclusie Door een gedegen visie te vormen over de nabije en verdere toekomst en te leren van experimenteren in de praktijk geeft het onderzoeksprogramma Het Nieuwe Melden inzicht in de meldkamer van de toekomst: wat is er mogelijk en hoe pakken we dit aan? Een mooie uitdaging waar nu en in de komende jaren hard aan gewerkt wordt. Doet u mee? Contact Voor meer informatie neem contact op met met Arnout de Vries via HET NIEUWE MELDEN
  11. 11. Uniscope uses current (real-time) information sources such as video, audio, GPS and map information. The data collected from this is bundled in a geographical information system (GIS). The GIS positions the information and objects on the map. Complete, detailed and well ordered. All users work together from a reliable, general, common operational image. Uniscope’s special feature is the system software that interconnects the various company systems and applications. Irrespective of the system or application that you are your partners use: Uniscope is supplier independent. A vital component is the advanced authorizations system. This allows you to determine on both a tactical as well as operational level - separate from each other - the information to which a user is given access. Why Uniscope? • Better and efficient communication through a clear picture • More effective actions through general operational picture • Processes are more efficient through system integration Position Uniscope’s platform registers and distributes the positional data of persons, objects and/or vehicles and then presents these on a map via Uniscope GIS. Live video Various video sources are displayed in one application. This includes fixed CCTV cameras, mobile cameras or body cameras. Images can be loaded directly from a camera or from another (management) system. Linking with a camera, LiveView or the control center system is also possible. Sensors Uniscope houses a range of sensors such as GPS trackers, cameras, alarm systems, alarm devices and various other sensors within the system. Uniscope groups these sources within one platform. This ensures that sensor data from various systems are presented uniformly and clearly. Furthermore, Uniscope also Uniscope All-in-one system for complete clarity It is essential for the operational command activities to have real-time total clarity. However, this still seems to be laborious in daily practice. The various organizations and locations use their own systems and applications that do not or hardly communicate with each other. This problem is now obsolete thanks to Uniscope. Uniscope is the perfect platform for operational command activities. The different functional systems and applications are interconnected and give you a clear overview in one system.
  12. 12. ensures optimal exchange of data between already existing systems. Map layers Sensors and trackers are grouped in various thematic map layers. These map layers are composed based on metadata (descriptive features such as for example the organizational unit). In addition to these thematic layers, Uniscope GIS can also display dynamic map layers. This can for instance be displays of weather conditions, traffic, visitor density as well as all kinds of dynamic data. Drawing layer It is possible to load current detailed drawings in Uniscope GIS. This allows you to present CAD- drawings of festival (grounds), routes, attack plans in a more simple fashion. In this way, all relevant parties are given an (even more) detailed picture, where positions are related to temporary objects such as for example, tents and road closures. Besides the loading of drawing layers from external systems, a new drawing layer can be directly made from Uniscope GIS. This layer can then be shared directly with all relevant parties. Authorization system Uniscope has an advanced authorization system. This means you can assign different levels of access rights to users ensuring they can only view the items from their assigned access. Uniscope defaults integrates with your current Active Directive or LDAP system. Alarms Uniscope integrates a range of alarm devices and alarm systems like a panic button from a personal tracker, burglary detection or Authentic Number Place Recognition (ANPR). The system receives and distributes alarms within the entire platform and presents these in Uniscope GIS or escalates these to an external system. With Uniscope you connect the most critical information to create one integrated operational picture that enables end-users to act quickly and effectively on critical situations. Figuur 2 De standaard componenten van de analyse van een veiligheidsvraagstuk Uniscope All-in-one system for complete clarity Contact Voor meer informatie neem contact op met met Roland Heesen via
  13. 13. THE PROBLEM In today’s fast-paced and digitalised world, government agencies need to evolve quickly to stay relevant. Old methods of data acquisition and transfer are now too slow to satisfy citizen’s needs. Consequently, there is a desire for innovative and integrated government services through which data can be shared seamlessly between public agencies. Equally appealing are the potentially more tailored and citizen-centric products businesses can offer if given access to selected agency data. Government agencies therefore need technological solutions to efficiently share data and systems, in order to provide more complete and citizen-centric services. However, data and systems interoperability is not easy. Data-sharing standards are often inconsistent and fragmented, while security needs and privacy concerns frequently dissuade governments from attempting whole-of-government platforms. With the exception of the most technologically competent, the majority of civil servants will encounter difficulties in implementing these new processes and solutions. AN INNOVATIVE SOLUTION In 2017, the Government Technology Agency of Singapore (GovTech) launched APEX, a centralised whole-ofgovernment platform designed to allow all government agencies to share data among themselves and with private enterprises through APIs. Prior to the launch, APEX was a small feature within a platform- as-a-service (PaaS) product that allowed hosted services to expose APIs to external services. However, it became evident that the APIhosting technology could be extended to meet a wider need across government gencies, providing a simple way to share data. The government spun off APEX as a separate project with a much more ambitious scope – to secure data-sharing, make API management user-friendly and increase the visibility of available APIs. APEX provides a secure data-sharing environment where agencies’ APIs are protected by authentication policies that conform to the latest security standards. Round-the-clock monitoring and transaction logging also ensure high system availability and access tracking. Most importantly, APEX allows data to be shared between the government intranet and the public internet by providing a bridge between the two networks in a safe and secure setup. This makes it possible for APEX96 is a whole-of-government platform which establishes common application programming interfaces (APIs) (see Box 18) that allow public agencies to share data and services with other agencies and private entities. APEX simplifies the communication protocols by which different government programmes can talk to each other, providing uniform governance, consistency and reliable performance. It enables innovation through a central atalogue and self-service portal where innovators can select common protocols to create new services and experiences for citizens. APEX thus addresses one of the biggest systemic challenges facing governments in the pre-era of machine-to-machine learning and AI – data and system interoperability. CASE STUDY APEX SINGAPORE
  14. 14. government agencies to publish APIs in order to share data hosted in the intranet with commercial entities deploying services on the internet. For example, one of the pilot projects, myInfo, was developed to share basic citizen data hosted on agency databases with banks to make it more convenient for citizens to set up bank accounts. This allows the private sector to build businesses using open government data. It also reduces substantially the number of times citizens need to register their information with the government – from multiple occasions to just once. Importantly, APEX simplifies API management by providing a user-friendly portal for both experts and ordinary users within the public sector (see APEX design principles in Figure 37). This is a rarity in government – the creation of user-friendly systems inside the public sector is often overshadowed by the prioritisation of intuitive solutions on the front-end for citizens. Yet, making such systems work inside the public sector – where IT skills remain scarce – is the foundation for future innovation. In addition, APIs served through APEX are registered in an API catalogue that can be freely browsed by other users. This encourages sharing and avoids the creation of digital silos or duplication of efforts. Users can browse and search the catalogue for relevant APIs, which may spark ideas for collaboration with other agencies or combining data in creative ways. The ability to perform self-registrations and request access to other agencies’ APIs, enables agencies to begin using the data they need without significant administrative overheads. The portal also provides a repository of information to guide users in on-boarding as data consumers or providers. APEX professional services also assist agencies to improve their general standards of API design and security. APEX was built by an in-house engineering team around the concept of agile development, thus allowing the rapid addition of new features to the platform. Further modularity was ensured by building the platform on micro-services architecture powered by RESTful APIs.98 This allows APEX to easily integrate with new systems both upstream and downstream. NOVELTY APIs and API gateways are no longer new or innovative technologies. The innovation and value of APEX stems from making these technologies more accessible and increasing their adoption in government. Interconnection and interoperability projects are currently receiving the greatest attention. For example, in Europe the ongoing Once-Only Principle Project99 is working to pilot solutions for 50 organisations from the European Union and Associated Countries. When technology supports secure and seamless data exchange, the possibilities are endless. RESULTS AND IMPACT APEX removes the need for users to handle many of the security challenges involved in serving APIs to a CASE STUDY APEX SINGAPORE
  15. 15. large consumer base. Since its launch in July 2017, APEX has steadily acquired new users, and on-boarded nine projects from across five agencies. These projects served a total of more than 625 000 API calls in a month. These figures are growing rapidly as APEX gains traction as a reliable API platform. For its success in this area, APEX recently received an award from ASEAN. USER PERSPECTIVE The APEX team was deeply involved in the on-boarding of its initial users, many of which have become trusted partners. Their positive experience with APEX has spurred them to readily suggest new features to improve their services. APEX’s professional services team regularly engages users in dialogue to better understand their needs. This enables them to identify and develop high-value, new user-centric features that can be added to APEX. CHALLENGES AND LESSONS LEARNED APEX is a model of innovation within tight restrictions that has succeeded in holding on to its vision. The team has navigated extensive government procedures and standards to redefine what it means to share data securely. APEX is reliant on a dedicated team with diverse skill-sets able to provide a clear vision and the impetus to deliver it with speed. Starting small as an in-house project, they had the freedom to self-manage, experiment, fail fast and regroup quickly. As APEX’s success depends on getting partners on board, the platform had to be built with the user in mind. APEX needed to remove barriers to entry for agencies using the platform based on user feedback. As such, the APEX team followed the agile methodology to iteratively and incrementally design, build and validate features of the platform. This helped the team to break down large problems into incrementally deliverable parts and empowered them to respond promptly to user feedback, as well as experiment with new, high-value features. The team was thus able to focus on releasing a minimal viable product early for testing. This drove a virtuous cycle of testing, iteration and extension, which allowed the team to release regular updates with enhanced features, bug fixes and the latest security patches. There are, of course, obvious trade-offs between adhering to government security standards and providing seamless data-sharing between agencies which APEX needs to balance. Project challenges identified during the planning phase included the need to bridge an internet–intranet separated infrastructure and comply with strict security standards. These constraints shaped the architecture and design of APEX. Continuing challenges include scaling APEX’s systems to adapt to demand and maintaining system stability as the user base grows. The team has automated the deployment and configuration of most subsystems to quickly and reliably scale-up to meet demand. In order to maintain system stability, monitoring capabilities are continuously enhanced to ensure any system issues are noted and addressed in a timely manner. CASE STUDY APEX SINGAPORE The APEX team
  16. 16. Students start tech startup after France attack California college student Anjali Banerjee was watching fireworks during a 2016 celebration on a seafront promenade in the French city of Nice when a man plowed a huge truck through the crowd, killing 86 people and wounding 200. The University of California, Berkeley incoming senior ran through mobs of people to escape the chaos and later joined classmates to search hospitals and plaster the city with flyers of fellow students reported missing in the July 2016 terrorist attack. She later learned three students were injured and UC Berkeley junior Nicolas Leslie, 20, was among the dead. Banerjee and several classmates have since turned their grief into a startup called Archer that builds digital tools to help journalists, investigators and human rights workers tackle terrorism, sanctions evasion, corruption and other global violence. “In that moment, it was hard finding the correct information. It was hard even going to different police stations. It was chaos,” said Banerjee, who is from London. The lack of official information following the terrorist attack by a Tunisian man led the students to self- organize and rely on locals to navigate the city as they looked for their missing friends. The Islamic State group claimed responsibility for the Bastille Day attack. Collaborating with each other and with the people of Nice made the students realize they could create a space in the digital world to help others do the same in the fight against terrorism, Banerjee said. The students built a free online platform that makes big data analysis and visualization easy When it comes to addressing a country’s key homeland security challenges, law enforcement and security agencies should take greater steps to acknowledge that they don’t have a monopoly on good policy or innovative ideas. For developing science and technology solutions for national security and public safety, security agencies need to actively engage industry and the research community. This should be an ongoing activity across the governments portfolio, working with security technology industries and start-ups operating at the emerging edge of new security developments. One suggestion would be that governments should establish a research area as exists in the US Department of Homeland Security and the UK Home Office. Governments need to listen to its wider industry stakeholders to test whether it’s asking the right innovation questions. And they need to consider whether others have found solutions to problems and threats they are yet to recognise. Remarkable private innovations in public safety
  17. 17. to access and that helps track people and companies that have been sanctioned by the United States for crimes that include money laundering, corruption and terrorism. They’re still working to turn their data analysis tool into a for-profit company, but the startup has achieved some success. Amnesty International is using one of its tools, Archer Meta, to verify photographs of the crackdown by security forces against minority Rohingya Muslims in Myanmar’s Rakhine state. The tool identifies when and where the photographs were taken and can process 50 at once, unlike other readily available internet tools that upload one photo at a time and can pose a security risk, said Sam Dubberley, a researcher with Amnesty International. “We get photographs in bulk from activists groups in Myanmar and we have to verify they are true. But uploading one at a time can be mind-numbing, tedious work,” he said. Archer Meta also offers an added layer of security by allowing users to analyze a photo’s metadata without relying on an internet connection, Dubberley said. “These tools are needed in human rights work, but they are prohibitively expensive to develop and there is no money in it for tech companies to build them,” he said. The group’s data analysis tool helps those investigating terrorist financing cases, “but there is a broader community of people who can rely on our tools, including those looking into war crimes, sanction violations or environmental crimes,” said Alice Ma, a former UC Berkeley student who founded the startup with Banerjee and classmate Tyler Heintz. Heintz was also in Nice at the time of the attack. They have since been joined by nearly two dozen other students, including several others who were with them in France as part of a monthlong class and competition hosted by the European Innovation Academy, which focuses on tech entrepreneurship education. Banerjee, a history major, had considered a career in foreign affairs but after what happened in France, she wanted to take immediate action. Weeks before the attack, her friend Tarishi Jain, a UC Berkeley sophomore, was among 20 hostages killed at a restaurant by militants in Dhaka, Bangladesh. “A lot of people all over the world exist in this kind of situation on the daily and we thought it was time somebody suggested another way we could combat it,” Banerjee said. The 2020 Olympic games in Tokyo A second example of innovation in security and public safety technology is that, for the first time, facial recognition technology will be used at an Olympic Games. 2020 Tokyo Olympics chiefs unveil this pioneering face-recognition security system. Tokyo 2020 Olympic and Paralympic organizers are confident that security for the games will run smoothly Remarkable private innovations in public safety
  18. 18. and effectively after unveiling a pioneering face- recognition ID system Tuesday. The technology, which will be provided by NEC Corp. and used at the Olympics and Paralympics for the first time, allows athletes, officials and others accredited for the games access to restricted areas by identifying their faces, based on images previously collected and stored in a database. Accredited individuals must hold a card containing a chip with their facial data up to a terminal at each security check point, while also looking into a camera to verify their identity. NEC says that the technology, which will not be used for spectators, performs facial recognition “immediately” and has an accuracy rate of more than 99 percent. Organizers believe the system will speed up a process that could otherwise see long lines of people waiting in the sweltering summer heat, and will “drastically increase security levels” by detecting forgeries and attempted misuse of access. “The key to games security is to prevent unauthorized people or items from entering venues,” said Tsuyoshi Iwashita, the security executive director for the games. “Tokyo 2020 will utilize an automated face recognition system for accredited people, a first for the Olympic or Paralympic Games, to prevent unauthorized access. “This latest technology will enable strict identification of accredited people compared with relying solely on the eyes of security staff, and also enables swift entry to venues — which will be necessary in the intense heat of summer. I hope this will ensure a safe and secure Olympic and Paralympic Games and help athletes perform at their best.” Around 300,000 people are expected to have authorized access to the July 24-Aug. 9 Tokyo Games where over 40 venues will be spread around the city and beyond, rather than clustered together in a central Olympic Park. The face-recognition system will be just one of several security layers at the venues, with perimeter fences, X-ray screening and cameras also planned.“The facial recognition system will not be used for spectators” but only those authorized, said Iwashita. “Accredited people will need to go to areas where spectators are not allowed, and we will need greater security to deal with that. People will need to go in and out of secure areas many times, and the facial recognition system will allow that process to run more smoothly.” Remarkable private innovations in public safety