CSRIC III Report on Next Generation Alerting

Total Page:16

File Type:pdf, Size:1020Kb

CSRIC III Report on Next Generation Alerting The Communications Security, Reliability and Interoperability Council III Working Group 2 Final Report March 2013 March 2013 WORKING GROUP 2 Next Generation Alerting Final Report Page 1 of 81 The Communications Security, Reliability and Interoperability Council III Working Group 2 Final Report March 2013 Table of Contents 1 Results in Brief ......................................................................................................................... 5 1.1 Executive Summary ......................................................................................................... 5 2 Introduction .............................................................................................................................. 6 2.1 CSRIC Structure ............................................................................................................... 7 2.2 Working Group 2 Team Members ................................................................................... 7 3 Objective, Scope, and Methodology ........................................................................................ 8 3.1 Objective .......................................................................................................................... 8 3.2 Scope ................................................................................................................................ 8 3.3 Methodology .................................................................................................................... 9 3.3.1 Sub-Group Structure ................................................................................................. 9 3.3.2 Collaboration via Portal .......................................................................................... 10 4 Background ............................................................................................................................ 11 4.1 Current Alerting Activities and Components ................................................................. 11 4.1.1 Alert Activity Chain ................................................................................................ 11 4.1.2 Current Example of an Alerting Architecture ......................................................... 12 4.2 Challenges of Existing Systems ..................................................................................... 13 4.2.1 What limitations exist in the IPAWS Network that effect In-Field Operations? ... 13 4.2.2 Enhancements and Emerging Technology .............................................................. 15 4.2.2.1 Emerging Technologies....................................................................................... 15 4.2.2.2 Enhancements and Additional Functionality ...................................................... 16 4.3 Technology Solutions and Applications ........................................................................ 20 4.3.1 Technology Overview ............................................................................................. 20 4.3.2 Service and Applications Overview ........................................................................ 22 4.3.3 Description of Technology and Limitations ........................................................... 23 4.3.4 Future Dissemination Technologies ....................................................................... 24 5 Architectures Development Opportunities ............................................................................. 25 5.1 Standards, Protocols, Policies and Procedures ............................................................... 25 5.1.1 Authorization and Authentication of Alert Originators .......................................... 25 5.1.2 Recent Innovation in Alert Dissemination Technologies ....................................... 26 5.1.3 Assumption of CAP Data Format ........................................................................... 27 5.1.4 Support of New Data Types in CAP ....................................................................... 27 5.1.5 Emergence of Profiles under CAP .......................................................................... 28 5.1.6 Widespread CAP Adoption Including States/Local/Tribal Governments .............. 28 5.1.7 Impact of IPAWS-OPEN on CAP Reputation........................................................ 29 5.1.8 Limited Incentive to Adopt CAP ............................................................................ 30 5.1.9 Multimedia Alerts ................................................................................................... 30 5.1.10 AO/AA Need to Verify Message Dissemination .................................................... 31 5.1.11 No Clarity on Required Records ............................................................................. 32 5.2 Platforms ........................................................................................................................ 32 5.2.1 Alert-Receiving Communication Devices .............................................................. 32 5.2.1.1 Introduction ......................................................................................................... 32 Page 2 of 81 The Communications Security, Reliability and Interoperability Council III Working Group 2 Final Report March 2013 5.2.1.2 Common Characteristics of Next Generation Communication Devices ............. 32 5.2.2 Aggregation Systems .............................................................................................. 33 5.2.2.1 Introduction ......................................................................................................... 33 5.2.2.2 Advantages of Single Aggregator ....................................................................... 33 5.2.2.3 Disadvantages of Single Aggregator ................................................................... 34 5.3 Implementing New Dissemination Technologies on a National Alert Platform ........... 34 5.3.1 Introduction ............................................................................................................. 34 5.3.2 Objective ................................................................................................................. 35 5.3.3 Observations about Existing IPAWS-Supported Dissemination Technologies ..... 35 5.3.4 Introducing New Alert Dissemination Technologies to the Public ........................ 36 5.4 Adherence to Four Components of Digital Security ...................................................... 36 5.5 User Opt-In/Opt-Out Control ......................................................................................... 37 6 Social Media Alerting ............................................................................................................ 37 6.1 Variety of Social Media Categories ............................................................................... 37 6.1.1 Terminology ............................................................................................................ 39 6.1.2 Other Efforts Related to Social Media Alerting ..................................................... 39 6.1.3 Intervention of Social Media Providers in Delivering the Social Media Alerts ..... 40 6.1.4 Social Media Alerting Opportunities ...................................................................... 40 6.1.4.1 Training Emergency Managers ........................................................................... 40 6.1.4.2 Training Sources ................................................................................................. 40 6.1.4.3 Social Media’s Continuous Evolution................................................................. 41 6.1.4.4 Emergency Managers’ Challenges ...................................................................... 41 6.1.5 Promoting & Funding of Innovative Tools that Enhance Social Media Alerting .. 41 6.1.5.1 Publicizing Strategic Vision ................................................................................ 41 6.1.5.2 Support of the Open-Source Developer Community .......................................... 42 6.1.5.3 Limited Governmental R&D Funding ................................................................ 42 6.1.6 Scope of Social Media Alerting .............................................................................. 42 6.1.6.1 Coupling Social Media Alerting with Citizen Responses ................................... 42 6.1.6.2 Restricting Two-way Communications ............................................................... 42 6.1.7 Hidden Cost of Social Media Alerting.................................................................... 43 6.1.8 Understanding Public Response ............................................................................. 43 6.1.9 Geo-Targeting Social Media Alerting .................................................................... 43 6.1.10 Social Media Alerting and the Subscriber .............................................................. 44 6.1.10.1 Crowd-to-Crowd Propagation ............................................................................. 44 6.1.10.2 Alerting Accounts ............................................................................................... 44 6.1.10.3 Limited by Available Data .................................................................................. 45 6.1.10.4 SM was not Built for Alerts ................................................................................ 45 6.1.10.5 Elite
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Understanding the Value of Arts & Culture | the AHRC Cultural Value
    Understanding the value of arts & culture The AHRC Cultural Value Project Geoffrey Crossick & Patrycja Kaszynska 2 Understanding the value of arts & culture The AHRC Cultural Value Project Geoffrey Crossick & Patrycja Kaszynska THE AHRC CULTURAL VALUE PROJECT CONTENTS Foreword 3 4. The engaged citizen: civic agency 58 & civic engagement Executive summary 6 Preconditions for political engagement 59 Civic space and civic engagement: three case studies 61 Part 1 Introduction Creative challenge: cultural industries, digging 63 and climate change 1. Rethinking the terms of the cultural 12 Culture, conflict and post-conflict: 66 value debate a double-edged sword? The Cultural Value Project 12 Culture and art: a brief intellectual history 14 5. Communities, Regeneration and Space 71 Cultural policy and the many lives of cultural value 16 Place, identity and public art 71 Beyond dichotomies: the view from 19 Urban regeneration 74 Cultural Value Project awards Creative places, creative quarters 77 Prioritising experience and methodological diversity 21 Community arts 81 Coda: arts, culture and rural communities 83 2. Cross-cutting themes 25 Modes of cultural engagement 25 6. Economy: impact, innovation and ecology 86 Arts and culture in an unequal society 29 The economic benefits of what? 87 Digital transformations 34 Ways of counting 89 Wellbeing and capabilities 37 Agglomeration and attractiveness 91 The innovation economy 92 Part 2 Components of Cultural Value Ecologies of culture 95 3. The reflective individual 42 7. Health, ageing and wellbeing 100 Cultural engagement and the self 43 Therapeutic, clinical and environmental 101 Case study: arts, culture and the criminal 47 interventions justice system Community-based arts and health 104 Cultural engagement and the other 49 Longer-term health benefits and subjective 106 Case study: professional and informal carers 51 wellbeing Culture and international influence 54 Ageing and dementia 108 Two cultures? 110 8.
    [Show full text]
  • The Cell Phone Junkie Show #204 1:12:19 Show Notes an Iphone Goes Missing, New Hardware from Dell, and Joey's Flipping Out
    The Cell Phone Junkie Show #204 1:12:19 Show Notes An iPhone goes missing, new hardware from Dell, and Joey's flipping out. iPhone/iPod Touch Application News Apple Q2 results Nokia Q1 results Ericsson Q1 results AT&T Q1 2010 numbers Verizon Q1 2010 numbers Our tech savvy supreme court FCC takes action on roaming What's happening with Palm Palm CEO Rubinstein says they don't need a buyer Thanks to our sponsor, Netflix Devices Gizmodo gets Apple's next iPhone ...and paid $5k for it And now Apple wants it back No user removable battery 3G iPad coming 4/30 Palm Pre Plus on AT&T spotted Pre and Pixi headed to France Dell Lightning VZW Bold announced/available 5/1? Sprint Bold 9650 coming out on 5/16 Blackberry Pearl 9105 Blackberry OS 6.0 screenshots Blackberry 9670 flip Dell Thunder Dell Smoke Dell Flash Dell Aero T-Mobile to carry Android Garminfone Samsung Reality Samsung Restore LY Mystique on US Cellular TCPJ Unlocked Software Seesmic updates Android client Motorola Devour gets an OTA update Android on iPhone Android Market hits 50,000 Google Maps updates for Win Mo and S60 Nokia delays arrival of Symbian 3 and 4 Google no longer researching Nexus 3G issues Google denies reports of turn-by-turn service Protect your privacy on Facebook Latest Facebook for Android Sirius/XM coming to Android Whats new in webOS Questions/Comments Question from David The Cell Phone Junkie RSS URL How to add podcasts through Google Reader Comment from Adam Question from Jared Question from Jason Question from Edward Comment from Adam How to Contact us: www.thecellphonejunkie.com [email protected] 206-203-3734 Facebook Mickey Twitter Joey Twitter Website Twitter iTunes comments How to Listen: Subscribe iPhone/iPod Touch Application iTunes Download the show directly 510-495-6352.
    [Show full text]
  • The Role of Business in Disaster Response a Business Civic Leadership Report BCLC Is an Affilliate of the U.S
    The Role of Business in Disaster Response A Business Civic Leadership Report BCLC is an affilliate of the U.S. Chamber of Commerce. The Role of Business in Disaster Response Introduction Information Technology S 2 Business Civic Leadership Center 30 Cisco Corporate Expertise in Disasters Using Expert Networking Knowledge to Assist T Communities in Crisis Resilience 32 IBM Preparedness Beyond Search & Rescue: Improving Disaster Zone’s Long-Term Prospects 6 Office Depot Talking About Preparedness: EN 34 Google Leave No Stone Unturned Google’s Crisis Response Initiative 8 Citi T 36 Microsoft Natural Disaster Financial Management: Increasing Information and Technology Capacity It’s All About Precrisis Preparation in Times of Disaster 10 Shell A Strategic Approach to Response and Recovery Insurance 40 Allstate A Promise to Our Communities Is Our Business Public-Private Partnership CON 14 Maryland Emergency Management Agency Infrastructure F Maryland Businesses Get Their Stake in 44 Degenkolb Engineers Emergency Response Degenkolb’s 70-Year Tradition of Earthquake Chasing Lessons Learned 16 Walmart Public-Private Collaboration: Six Years 46 Proteus On-Demand After Hurricane Katrina Learn From the Past, Be Involved in the Future E O 48 Project Jomo Storm of Ideas Logistics L 20 UPS We Love the Logistics of Disaster Response Debris Removal 22 FedEx 52 Caterpillar Logistics Support During Disasters: Changing Lives Through Sustainable Progress Another Day at the Office 54 Ceres Environmental TAB Helping Jefferson County Recover Food 26 Cargill An Unprecedented Crisis in the Horn of Africa Prompts an Extraordinary Response From Cargill bclc.uschamber.com 2012 • 1 INTRODUCTION Corporate Expertise in Disasters By Stephen Jordan and Gerald McSwiggan, U.S.
    [Show full text]
  • The Common Alerting Protocol (CAP) and the Challenge of Public Warning Date: 15/05/2017 to 21/05/2017 Summary
    Expert: Eliot Christian Title of the Session: The Common Alerting Protocol (CAP) and the Challenge of Public Warning Date: 15/05/2017 to 21/05/2017 Summary Societies around the world are engaged in a profound revolution in emergency alerting. Enabled by uptake of the international standard Common Alerting Protocol, all manner of communications networks can now be leveraged to get alerts to everyone who needs them, wherever they are and whatever they are doing. With these new capabilities, it is clear that many lives can be saved and livelihoods protected as emergency alerting becomes more available, more precise, more reliable, completely secure, and as fast as it can be. Context Getting Public Warnings to People Online To help disseminate public warnings, alerting authorities have long relied on commercial media, such as newswires, broadcast radio and television. Television stations insert "crawl text" with the warning message; radio stations insert a recording. This public-private collaboration has required huge investments in specialized technology. Now people are using cell phones and online media more and more. Do societies worldwide need a new round of huge investments in specialized technology to get warnings to all these people online? Actually, huge new investments are not needed. Online media and alerting authorities already developed ways to get warnings to cell phones and people online, at minimal cost. The Hazard App developed by the Red Cross Global Disaster Preparedness Center (GDPC) is one example. As part of the Universal App Program, GDPC partners with Red Cross and Red Crescent national societies to develop First Aid and Hazard alerting apps.
    [Show full text]
  • T Following Is a Dering Socia Dpress and M F Options to E Of
    Social Media – Top Tools for Social Media Management The following is a comprehensive toolset that we recommend for organizations considering social media management responsibilitiees. Some tools overlap (such as Wordpress and MovableType) but their inclusion here is meant to provide you with a set of options to evaluate for your own implementation needs. Some of the options listed here are free, some have freemium or free and paid options, while others are fee‐based services only. They are color coded accordingly. FREE FREEMIUM/HYBRID FEE BASED SOCIAL MEDIA MANAGEMENT . Namechk [www.namechk.com] Namecheck allows yoou to determine whether or not your social media ‘shortname’ (such as a Twitter handle or Facebook username) is taken. Use this too secure your namespaces before you even begin anything in social media. BLOGS AND BLOGGING . Wordpress [www.wordpress.com & wordpress.org] One of the most popular blogging platforms in the world. Movable Type [www.movabletype.com] Another popular and full‐featured blog platform that runs some of the top ranked blogs. Drupal [www.drupal.com) Drupal is more of a website platform, but it is very robust for complete sites as well as blogss. Compendium [www.compendium.com] A high‐end enterprise‐class blog platform. (Indium Corp. blogs are based on this software) . Scribefire – A Firefox plugin that connectts directly to your blog allowing you to write blog posts from within the browser window. Windows Live Writer (offline blog editor – works on all platforms) . Posterous (allows blog posting from emaail) . Tumblr – [www.tumblr.com] A blogging platform that makes it easy to share all forms of media, not just text.
    [Show full text]
  • App Integration: the Future of How Smartphones Interface with Infotainment Systems App Integration: the Future of How Smartphones Interface with Infotainment Systems
    App integration: The future of how smartphones interface with infotainment systems App integration: The future of how smartphones interface with infotainment systems he average driver today is an avid smartphone app user, and most want to use some, or all, of these apps in the car. However, most consumers find using their smartphone in T their car while driving distracting; 82% of new car buyers in the United States, the United Kingdom, Germany, and China told IHS this in its Connected Car consumer survey. Controlling smartphone apps via the car’s human machine interface (HMI) does not eliminate all distraction problems, but is certainly an improvement. The solution is smartphone app integration software platforms, which are now so plentiful that two hands are needed to count the various contenders. There are basically two ways of doing this: • Modify the smartphone operating system (OS): Makes the smartphone’s OS interface with an in-vehicle infotainment (IVI) system’s HMI. These are often called screen projection mode solutions or screen mirroring solutions. This will also require specific middleware on each infotainment system that uses this variant of smartphone app integration. This middleware will implement restrictions on what content can be shown while driving to reduce driver distractions. The main advantage is that there will be minimal or no change needed by the app developers. Typically, this type of solution requires minimal updates by developers to extend their apps to work with these projection mode technologies, through an application program interface (API). Apple CarPlay and Android Auto take this approach. • Create an intermediate app platform: Connects the smartphone to the in-vehicle HMI.
    [Show full text]
  • Best Practices on Public Warning Systems for Climate-Induced
    Best practices on Public Warning Systems for Climate-Induced Natural Hazards Abstract: This study presents an overview of the Public Warning System, focusing on approaches, technical standards and communication systems related to the generation and the public sharing of early warnings. The analysis focuses on the definition of a set of best practices and guidelines to implement an effective public warning system that can be deployed at multiple geographic scales, from local communities up to the national and also transboundary level. Finally, a set of recommendations are provided to support decision makers in upgrading the national Public Warning System and to help policy makers in outlining future directives. Authors: Claudio Rossi Giacomo Falcone Antonella Frisiello Fabrizio Dominici Version: 30 September 2018 Table of Contents List of Figures .................................................................................................................................. 2 List of Tables ................................................................................................................................... 4 Acronyms ........................................................................................................................................ 4 Core Definitions .............................................................................................................................. 7 1. Introduction .........................................................................................................................
    [Show full text]
  • Private Sector Participation in Disaster Recovery and Mitigation
    Disaster Recovery Guidance Series Private Sector Participation in Disaster Recovery and Mitigation Global Facility for Disaster Reduction and Recovery Cover photo: Dar es Salaam Port, Tanzania. Photo: Rob Beechey/World Bank Contents Acronyms .......................................................................................................................................................... iii Acknowledgments .............................................................................................................................................. 1 I. Introduction ................................................................................................................................................ 2 A. Disasters, Disaster Recovery, Mitigation and the Role of the Private Sector ...................................... 2 B. About this Guidance Note: Aim, Relevance and Scope ........................................................................ 4 C. Key Terms in this Guidance Note .......................................................................................................... 5 1. Disaster Management Cycle, Disaster Recovery and Mitigation .................................................... 5 2. Private Sector Participation (PSP) .................................................................................................. 6 3. Public-Private Partnerships (PPPs) ................................................................................................. 7 4. Corporate Social Responsibility (CSR) ...........................................................................................
    [Show full text]
  • Idea Lab Session: Smartphone Tips & Tools for Success
    Idea Lab Session: SmartPhone Tips & Tools for Success Thursday, February 28, 2013, 8:30 and 11:10 a.m. Randall Dean, MBA Author and Trainer Randall Dean Consulting and Training, LLC East Lansing, Mich. Randall Dean, the "totally obsessed" time management/PDA guy and email sanity expert and author of the recent Amazon email bestseller, “Taming the E-mail Beast: 45 Key Strategies for Managing Your E-mail Overload,” is a preferred source for speaking and training programs on advanced time management-using technology, managing the mess of email and information overload, and related topics including managing great meetings and ending office clutter. Randy has more than 20 years of experience using and teaching advanced principles of time management, project management, and personal organization. His popular keynote/breakout programs, "Finding an Extra Hour Every Day" and "Taming the E-mail Beast: Managing the Mess of E-mail and Info Overload" are great sessions for conference and association meetings. These programs combine humor with extraordinarily relevant and useful content and provide strategy- rich information on finding and saving time and taming the email beast at home and work. Session Description: Get organized and maximize your efficiency by learning amazing smartphone tips and tools during this interactive session. Top Three Session Ideas Tools or tips you learned from this session and can apply back at the office. 1. ______________________________________________________________________ 2. _______________________________________________________________________
    [Show full text]
  • Special Characters A
    453 Index ■ ~/Library/Safari/WebpageIcons.db file, Special Characters 112 $(pwd) command, 89–90 ~/Library/Saved Searches directory, 105 $PWD variable, 90 ~/Library/Services directory, 422–423 % (Execute As AppleScript) menu option, ~/Library/Workflow/Applications/Folder 379 Actions folder, 424 ~/ directory, 6, 231 ~/Library/Workflows/Applications/Image ~/bin directory, 6, 64, 291 Capture folder, 426 ~/Documents directory, 281, 290 ~/Movies directory, 323, 348 ~/Documents/Knox directory, 255 ~/Music directory, 108, 323 ~/Downloads option, 221, 225 ~/Music/Automatically Add To iTunes ~/Downloads/Convert For iPhone folder, folder, 424 423–424 ~/Pictures directory, 281 ~/Downloads/MacUpdate ~/.s3conf directory, 291 Desktop/MacUpdate Desktop ~/ted directory, 231 2010-02-20 directory, 16 ~/Templates directory, 60 ~/Downloads/To Read folder, 425 ~/Templates folder, 62 ~/Dropbox directory, 278–282 Torrent program, 236 ~/Library folder, 28 1Password, 31, 135, 239–250 ~/Library/Application 1Password extension button, 247–248 Support/Evom/ffmpeg directory, 1Password.agilekeychain file, 249 338 1PasswordAnywhere tool, 249 ~/Library/Application 1Password.html file, 250 Support/Fluid/SSB/[Your 2D Black option, 52 SSB]/Userstyles/ directory, 190 2D With Transparency Effect option, 52 ~/Library/Application Support/TypeIt4Me/ 2-dimensional, Dock, 52 directory, 376 7digital Music Store extension, 332 ~/Library/Caches/com.apple.Safari/Webp age Previews directory, 115 ~/Library/Internet Plug-Ins directory, 137 ■A ~/Library/LaunchAgents directory, 429, 432
    [Show full text]
  • 30-Minute Social Media Marketing
    30-MINUTE SOCIAL MEDIA MARKETING Step-by-Step Techniques to Spread the Word About Your Business FAST AND FREE Susan Gunelius New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto To Scott, for supporting every new opportunity I pursue on and off the social Web and for sending me blog post ideas when I’m too busy to think straight. And to my family and friends for remembering me and welcoming me with open arms when I eventually emerge from behind my computer. Copyright © 2011 by Susan Gunelius. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-174865-0 MHID: 0-07-174865-2 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-174381-5, MHID: 0-07-174381-2. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every oc- currence of a trademarked name, we use names in an editorial fashion only, and to the benefi t of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs.
    [Show full text]