Skip to content or view mobile version

Home | Mobile | Editorial | Mission | Privacy | About | Contact | Help | Security | Support

A network of individuals, independent and alternative media activists and organisations, offering grassroots, non-corporate, non-commercial coverage of important social and political issues.

Katrina Quality Emergency Management for Oregon!

NORTHCOM | 11.08.2007 03:32 | Analysis | Anti-militarism | Terror War

The same organization that provided emergency information management services for southern Louisiana in 2005 is now helping Oregon. Swan Island Networks is providing logistical support for Operation Noble Resolve 7-2. This is an emergency preparedness drill to be held in Portland, Oregon, USA August 20-24.  http://www.jfcom.mil/about/experiments/nobleresolve.html


 http://www.swanisland.net/solutions/stories/stories_control.html
In-Depth Information Control
Problem:
Lack of confidence in information security beyond the firewall. Inability to share critical, sensitive information with partners... even though it could be extremely important to do so in critical situations.

Solution:
Louisiana Regional Command Operations Network (LA-RECON) uses Swan Island's secure caching technology to distribute sensitive information—and embargo it until an emergency.

Where:
Southern Louisiana

When:
2004 - 2005

What:
Proprietary and sensitive emergency response plans of private sector companies stored in Swan Island's secure caching system, where it could be accessed by public officials in the case of an emergency.

How:
TIES' SWARM secure caching system allows information to be stored—and locked—on many computers... ready to be used if, and only if, a major emergency occurs.

 http://www.swanisland.net/news/releases/012505-01.html

Pressroom
Archives

Press Release
Swan Island Networks' SWARM Technology Rated As Top Performer In U.S. Military Simulation
Joint Warrior Interoperability Demonstration (JWID) 2004 Final Report: "SWARM was a complete success"; "This is the best technology that I have seen in years." —a Warfighter
Portland, OR—January 25, 2005—Swan Island Networks, a software and services company at the forefront of designing advanced information sharing systems, today announced that the final report from the 2004 Joint Warrior Interoperability Demonstration (JWID) highlighted the company's SWARM(R) product as a "Top Performer" and a "complete success" among 28 selected technologies. SWARM helped evaluators meet one of their primary objectives: identifying solutions to facilitate information sharing across multiple information domains, including defense and other government agencies.

"This is an important and objective endorsement for our SWARM technology," commented Charles Jennings, founder and CEO of Swan Island Networks. "SWARM was specifically created to improve information sharing following the 9/11 terrorist attacks, so having it clearly recognized as a successful contributor to this rigorous anti-terrorism simulation is extremely gratifying. And, it points to the efficacy of this type of technology at all levels of government."

JWID 2004 involved military services and government agencies from 25 countries, with U.S. Northern Command (NORTHCOM) as the host combatant commander, all participating in a scripted scenario over a global network. SWARM was tested by warfighters in three locations: NORTHCOM (Colorado Springs, CO), Naval Surface Warfare Center (Dahlgren, VA) and DISA (Alexandria, VA).

As noted in the final report: "SWARM provided numerous capabilities that allowed them to complete their mission and tasking more efficiently and in a timelier manner ... SWARM was easy to use and displayed a protected messaging capability via Internet with file attachments ... SWARM provided capabilities that were a tremendous improvement over the current capabilities and methods. Warfighters unanimously agreed that SWARM is needed within the HLS/HLD community and its current capabilities would greatly benefit those in the field ... SWARM provided a solution to facilitate tightly controlled information sharing across multiple information domains."

Additional comments included:
—"This technology could easily be introduced into other DoD agencies."

—"Relatively easy to learn and use. I especially like the ability to pull up maps of different style and scales from ESRI."

—"A very useful tool at the 'sensitive but unclassified level'."

—"This is the best technology that I have seen in years."

Final Analysis—"a complete success" ... "well executed"

The report concludes: "SWARM was a complete success in JWID 2004. SWARM provided the warfighter the means to share sensitive but unclassified information at multiple echelons, including down to state National Guard, state emergency operations centers, critical infrastructure, local emergency operations centers, 9-1-1 centers, and first responders, while providing assurances that the content will not be compromised, even after it has left the '.mil' domain. This connectivity greatly enhanced the operator's ability to provide military assistance to civilian authorities. SWARM fully met the JWID objective to provide solutions to facilitate information sharing across multiple domains that include defense and other government agencies."

The report also commented on SWARM's ability to contribute to a common operational picture: "SWARM provided the same capabilities to civilian HLS/HLD organizations with a trusted means to share their own sensitive information back for rapid aggregation, fusion and filtered roll-up to higher echelons, including NORTHCOM, in a controlled, structured and orderly manner, overall improving the common operational picture."

SWARM's capabilities were "well executed and resulted in successful
completion of all events," which included:
—Pre-positioning content; no client viewing allowed (embargoed content): content was published to SWARM warfighters through encrypted web services, then stored in each warfighter's local encrypted SmartCache(TM) but hidden from other SWARM warfighter's access.

—Pre-positioning content, client viewing allowed: content was published to SWARM warfighters through encrypted web services, and then stored in each warfighter's local encrypted SmartCache, available for immediate access by all SWARM warfighters.

—Centralized deletion of pre-positioned client content: SWARM Keepers were able to remotely delete content from each SWARM warfighter's SmartCache.

—End point control (No "Cut", "Paste", "Print", "Save As", etc.): The SWARM warfighter, with built-in content protection technology, allowed SWARM Keepers to prevent the unintended use of content once distributed to their respective PC.

—Content use reports (ORCON): SWARM Keepers demonstrated the ability to run reports showing how content was used after it was published to SWARM warfighters, supporting the notion of "Originator Control" of content (ORCON).

—Targeted alerting notification with associated, relevant pre-positioned content: SWARM Keepers demonstrated the ability to send alerts targeted to either a sub-set of SWARM users, or all SWARM users. Content that is contextually relevant to the current alert (procedures, guidelines, etc.) that had been pre-positioned into warfighter SmartCaches was associated with the alerts, which allowed the warfighter rapid access if needed.

—Poison pill: SWARM Keepers also demonstrated the ability to remotely delete the contents of a SWARM warfighter's encrypted SmartCache, delete the SmartCache, and then disable the SWARM warfighter application from being operational.

—GIS integration: Through SWARM's ESRI integration, SWARM Keepers demonstrated the ability to dynamically generate a number of map types and then associate those maps with alerts.

—Client SitReps, content submission: SWARM warfighters submitted structured Situation Reports (SitReps), with audio message recordings and content attachments to the SWARM Hive for SWARM Keeper review. If the warfighter was offline, the forms were still able to be filled out and submitted, and then the SWARM warfighter delivered the forms once it went online.

—Encrypted, hidden local PC content cache: Each SWARM warfighter demonstrated the capability to protect content from unintended access or use because content was stored in an encrypted, hidden cache container, integrated into the SWARM warfighter's PC.

Swarm demonstrated the capabilities and functionality that it was designed to achieve and required no unique hardware, operating under a standard Microsoft(R) Windows(R) environment.

About JWID
The Joint Warrior Interoperability Demonstration (JWID) is the U.S. Chairman of the Joint Chiefs of Staff annual event that enables combatant commanders, national civil authorities and the international community to investigate command and control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) solutions that focus on relevant and timely objectives for enhancing coalition interoperability and exploring new partnerships. The event provides opportunity for federal and local government, private industry and coalition partners to demonstrate new and emerging information technologies in a simulated warfighting environment. In 2005 JWID will transition to CWID (Coalition Warrior Interoperability Demonstration). For the full 2004 report, see  https://www.cwid.js.mil/public/cwid05fr/htmlfiles/u113intr.html

 http://www.swanisland.net/solutions/stories/stories_emergency.html
Emergency Management Dashboard
Problem:
Antiquated emergency alerting. Emergency Management has only unreliable phone trees and haphazard e-mail to communicate in a crisis.

Solution:
Multnomah Country's Threat Matrix Program

Where:
Multnomah County, Oregon

When:
2004 - Present

What:
Multnomah Co. installs an emergency management communications system with 100 local companies and agencies, and with 60 internal county officials.

How:
Using a graphically rich, fully automated dashboard, TIES provides a community-wide common operational picture for county officials and their emergency management partners.

NORTHCOM

Upcoming Coverage
View and post events
Upcoming Events UK
24th October, London: 2015 London Anarchist Bookfair
2nd - 8th November: Wrexham, Wales, UK & Everywhere: Week of Action Against the North Wales Prison & the Prison Industrial Complex. Cymraeg: Wythnos o Weithredu yn Erbyn Carchar Gogledd Cymru

Ongoing UK
Every Tuesday 6pm-8pm, Yorkshire: Demo/vigil at NSA/NRO Menwith Hill US Spy Base More info: CAAB.

Every Tuesday, UK & worldwide: Counter Terror Tuesdays. Call the US Embassy nearest to you to protest Obama's Terror Tuesdays. More info here

Every day, London: Vigil for Julian Assange outside Ecuadorian Embassy

Parliament Sq Protest: see topic page
Ongoing Global
Rossport, Ireland: see topic page
Israel-Palestine: Israel Indymedia | Palestine Indymedia
Oaxaca: Chiapas Indymedia
Regions
All Regions
Birmingham
Cambridge
Liverpool
London
Oxford
Sheffield
South Coast
Wales
World
Other Local IMCs
Bristol/South West
Nottingham
Scotland
Social Media
You can follow @ukindymedia on indy.im and Twitter. We are working on a Twitter policy. We do not use Facebook, and advise you not to either.
Support Us
We need help paying the bills for hosting this site, please consider supporting us financially.
Other Media Projects
Schnews
Dissident Island Radio
Corporate Watch
Media Lens
VisionOnTV
Earth First! Action Update
Earth First! Action Reports
Topics
All Topics
Afghanistan
Analysis
Animal Liberation
Anti-Nuclear
Anti-militarism
Anti-racism
Bio-technology
Climate Chaos
Culture
Ecology
Education
Energy Crisis
Fracking
Free Spaces
Gender
Globalisation
Health
History
Indymedia
Iraq
Migration
Ocean Defence
Other Press
Palestine
Policing
Public sector cuts
Repression
Social Struggles
Technology
Terror War
Workers' Movements
Zapatista
Major Reports
NATO 2014
G8 2013
Workfare
2011 Census Resistance
Occupy Everywhere
August Riots
Dale Farm
J30 Strike
Flotilla to Gaza
Mayday 2010
Tar Sands
G20 London Summit
University Occupations for Gaza
Guantanamo
Indymedia Server Seizure
COP15 Climate Summit 2009
Carmel Agrexco
G8 Japan 2008
SHAC
Stop Sequani
Stop RWB
Climate Camp 2008
Oaxaca Uprising
Rossport Solidarity
Smash EDO
SOCPA
Past Major Reports
Encrypted Page
You are viewing this page using an encrypted connection. If you bookmark this page or send its address in an email you might want to use the un-encrypted address of this page.
If you recieved a warning about an untrusted root certificate please install the CAcert root certificate, for more information see the security page.

Global IMC Network


www.indymedia.org

Projects
print
radio
satellite tv
video

Africa

Europe
antwerpen
armenia
athens
austria
barcelona
belarus
belgium
belgrade
brussels
bulgaria
calabria
croatia
cyprus
emilia-romagna
estrecho / madiaq
galiza
germany
grenoble
hungary
ireland
istanbul
italy
la plana
liege
liguria
lille
linksunten
lombardia
madrid
malta
marseille
nantes
napoli
netherlands
northern england
nottingham imc
paris/île-de-france
patras
piemonte
poland
portugal
roma
romania
russia
sardegna
scotland
sverige
switzerland
torun
toscana
ukraine
united kingdom
valencia

Latin America
argentina
bolivia
chiapas
chile
chile sur
cmi brasil
cmi sucre
colombia
ecuador
mexico
peru
puerto rico
qollasuyu
rosario
santiago
tijuana
uruguay
valparaiso
venezuela

Oceania
aotearoa
brisbane
burma
darwin
jakarta
manila
melbourne
perth
qc
sydney

South Asia
india


United States
arizona
arkansas
asheville
atlanta
Austin
binghamton
boston
buffalo
chicago
cleveland
colorado
columbus
dc
hawaii
houston
hudson mohawk
kansas city
la
madison
maine
miami
michigan
milwaukee
minneapolis/st. paul
new hampshire
new jersey
new mexico
new orleans
north carolina
north texas
nyc
oklahoma
philadelphia
pittsburgh
portland
richmond
rochester
rogue valley
saint louis
san diego
san francisco
san francisco bay area
santa barbara
santa cruz, ca
sarasota
seattle
tampa bay
united states
urbana-champaign
vermont
western mass
worcester

West Asia
Armenia
Beirut
Israel
Palestine

Topics
biotech

Process
fbi/legal updates
mailing lists
process & imc docs
tech