CSRIC III Report on Next Generation Alerting

CSRIC III Report on Next Generation Alerting

The Communications Security, Reliability and Interoperability Council III Working Group 2 Final Report March 2013 March 2013 WORKING GROUP 2 Next Generation Alerting Final Report Page 1 of 81 The Communications Security, Reliability and Interoperability Council III Working Group 2 Final Report March 2013 Table of Contents 1 Results in Brief ......................................................................................................................... 5 1.1 Executive Summary ......................................................................................................... 5 2 Introduction .............................................................................................................................. 6 2.1 CSRIC Structure ............................................................................................................... 7 2.2 Working Group 2 Team Members ................................................................................... 7 3 Objective, Scope, and Methodology ........................................................................................ 8 3.1 Objective .......................................................................................................................... 8 3.2 Scope ................................................................................................................................ 8 3.3 Methodology .................................................................................................................... 9 3.3.1 Sub-Group Structure ................................................................................................. 9 3.3.2 Collaboration via Portal .......................................................................................... 10 4 Background ............................................................................................................................ 11 4.1 Current Alerting Activities and Components ................................................................. 11 4.1.1 Alert Activity Chain ................................................................................................ 11 4.1.2 Current Example of an Alerting Architecture ......................................................... 12 4.2 Challenges of Existing Systems ..................................................................................... 13 4.2.1 What limitations exist in the IPAWS Network that effect In-Field Operations? ... 13 4.2.2 Enhancements and Emerging Technology .............................................................. 15 4.2.2.1 Emerging Technologies....................................................................................... 15 4.2.2.2 Enhancements and Additional Functionality ...................................................... 16 4.3 Technology Solutions and Applications ........................................................................ 20 4.3.1 Technology Overview ............................................................................................. 20 4.3.2 Service and Applications Overview ........................................................................ 22 4.3.3 Description of Technology and Limitations ........................................................... 23 4.3.4 Future Dissemination Technologies ....................................................................... 24 5 Architectures Development Opportunities ............................................................................. 25 5.1 Standards, Protocols, Policies and Procedures ............................................................... 25 5.1.1 Authorization and Authentication of Alert Originators .......................................... 25 5.1.2 Recent Innovation in Alert Dissemination Technologies ....................................... 26 5.1.3 Assumption of CAP Data Format ........................................................................... 27 5.1.4 Support of New Data Types in CAP ....................................................................... 27 5.1.5 Emergence of Profiles under CAP .......................................................................... 28 5.1.6 Widespread CAP Adoption Including States/Local/Tribal Governments .............. 28 5.1.7 Impact of IPAWS-OPEN on CAP Reputation........................................................ 29 5.1.8 Limited Incentive to Adopt CAP ............................................................................ 30 5.1.9 Multimedia Alerts ................................................................................................... 30 5.1.10 AO/AA Need to Verify Message Dissemination .................................................... 31 5.1.11 No Clarity on Required Records ............................................................................. 32 5.2 Platforms ........................................................................................................................ 32 5.2.1 Alert-Receiving Communication Devices .............................................................. 32 5.2.1.1 Introduction ......................................................................................................... 32 Page 2 of 81 The Communications Security, Reliability and Interoperability Council III Working Group 2 Final Report March 2013 5.2.1.2 Common Characteristics of Next Generation Communication Devices ............. 32 5.2.2 Aggregation Systems .............................................................................................. 33 5.2.2.1 Introduction ......................................................................................................... 33 5.2.2.2 Advantages of Single Aggregator ....................................................................... 33 5.2.2.3 Disadvantages of Single Aggregator ................................................................... 34 5.3 Implementing New Dissemination Technologies on a National Alert Platform ........... 34 5.3.1 Introduction ............................................................................................................. 34 5.3.2 Objective ................................................................................................................. 35 5.3.3 Observations about Existing IPAWS-Supported Dissemination Technologies ..... 35 5.3.4 Introducing New Alert Dissemination Technologies to the Public ........................ 36 5.4 Adherence to Four Components of Digital Security ...................................................... 36 5.5 User Opt-In/Opt-Out Control ......................................................................................... 37 6 Social Media Alerting ............................................................................................................ 37 6.1 Variety of Social Media Categories ............................................................................... 37 6.1.1 Terminology ............................................................................................................ 39 6.1.2 Other Efforts Related to Social Media Alerting ..................................................... 39 6.1.3 Intervention of Social Media Providers in Delivering the Social Media Alerts ..... 40 6.1.4 Social Media Alerting Opportunities ...................................................................... 40 6.1.4.1 Training Emergency Managers ........................................................................... 40 6.1.4.2 Training Sources ................................................................................................. 40 6.1.4.3 Social Media’s Continuous Evolution................................................................. 41 6.1.4.4 Emergency Managers’ Challenges ...................................................................... 41 6.1.5 Promoting & Funding of Innovative Tools that Enhance Social Media Alerting .. 41 6.1.5.1 Publicizing Strategic Vision ................................................................................ 41 6.1.5.2 Support of the Open-Source Developer Community .......................................... 42 6.1.5.3 Limited Governmental R&D Funding ................................................................ 42 6.1.6 Scope of Social Media Alerting .............................................................................. 42 6.1.6.1 Coupling Social Media Alerting with Citizen Responses ................................... 42 6.1.6.2 Restricting Two-way Communications ............................................................... 42 6.1.7 Hidden Cost of Social Media Alerting.................................................................... 43 6.1.8 Understanding Public Response ............................................................................. 43 6.1.9 Geo-Targeting Social Media Alerting .................................................................... 43 6.1.10 Social Media Alerting and the Subscriber .............................................................. 44 6.1.10.1 Crowd-to-Crowd Propagation ............................................................................. 44 6.1.10.2 Alerting Accounts ............................................................................................... 44 6.1.10.3 Limited by Available Data .................................................................................. 45 6.1.10.4 SM was not Built for Alerts ................................................................................ 45 6.1.10.5 Elite

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    81 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us