STUDY REVEALS GROWING DEMAND FOR HIGH-SPEED DATA COMMUNICATIONS

Similar documents
2012 PUBLIC SAFETY INDUSTRY STUDY THE CHANGING REQUIREMENTS OF COMMUNICATIONS TECHNOLOGY FOR PUBLIC SAFETY

2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS

SOLUTION BRIEF. Video Changes the Future of Policing

white paper PUBLIC SAFETY ENTERS THE COLLECTIVE INTELLIGENCE ERA

SOLUTIONS BRIEF PUBLIC SAFETY LTE SOLUTIONS

A BRIEF LOOK AT THE DEVELOPMENT OF PUSH-TO-TALK TECHNOLOGY THROUGH THE AGES WHITE PAPER PTT TECHNOLOGY EVOLUTION

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Incident Scene, Event and Disaster Management

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

2018 Mobile Security Report

CLOSING IN FEDERAL ENDPOINT SECURITY

TRUSTED MOBILITY INDEX

Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance

Panda Security 2010 Page 1

DIMETRA X CORE DATA SHEET DIMETRA X CORE

Good Technology State of BYOD Report

BROADBAND AND THE FUTURE USER S EXPERIENCE

Chapter X Security Performance Metrics

Tackling Crime, Protecting Citizens and Assisting First Responders. IN COLLABORATION WITH A Frost & Sullivan Executive Brief

Kodiak Broadband PTT for Public Safety

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Disaster Unpreparedness June 3, 2013

Cyber Security. June 2015

Staying Connected with Mobile Devices in the Power Sector

TRANSFORM YOUR OPERATIONS WITH INTELLIGENCE

Technology That Has Your Back

MOTOROLA PUBLIC SAFETY LTE

Sales Presentation Case 2018 Dell EMC

Convergence Everywhere

Broadband PTT for LMR Augmentation

CYBERSECURITY RESILIENCE

As Enterprise Mobility Usage Escalates, So Does Security Risk

Toward an Automated Future

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

Introducing Unified Critical Communications

Trustlook Insights Q BYOD Trends & Practices

Critical Communications Service Layer

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

Security in India: Enabling a New Connected Era

EMPOWER PEOPLE IMPROVE LIVES INSPIRE SUCCESS

Driving the Need for Mobile Device Management (MDM)

IMPROVING NETWORK SECURITY

Kentucky Wireless Information Network Service (Ky-WINS)

Chapter X Security Performance Metrics

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

THALES DATA THREAT REPORT

Cybersecurity and Hospitals: A Board Perspective

Security in a Converging IT/OT World

P25 PORTABLE RADIO BROCHURE APX 900

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

Healthcare HIPAA and Cybersecurity Update

Bring your own device: a major security concern

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

2015 VORMETRIC INSIDER THREAT REPORT

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard

alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions

Todd Sander Vice President, Research e.republic Inc.

ForeScout Extended Module for Splunk

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities

Motorola Wireless Broadband. Video Surveillance Solutions

Top Network Considerations for Enterprise Mobility and BYOD

Washington State Interoperability Executive Committee

Security for NG9-1-1 SYSTEMS

PTT Technology Evolution

Trust Harris for LTE. Critical Conditions Require Critical Response

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

2016 COOLING THE EDGE SURVEY. Conducted by Vertiv Publication Date: August 30, 2016

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

Security Survey Executive Summary October 2008

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Public Safety Communications Evolution

IT SECURITY FOR NONPROFITS

Incident Response Table Tops

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS

Policing by Smartphone: What you need to know

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

BUILD AND MAINTAIN SAFE COMMUNITIES WITH ARCGIS ONE PLATFORM, MANY MISSIONS

Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.

Securing Health Data in a BYOD World

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

WHITE PAPER. Distribution Substation Outage Investigations. Overview. Introduction. By Ahmad Shahsiah, Ph.D., P.E. March 2018

Combating Cyber Risk in the Supply Chain

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Operationalize Security To Secure Your Data Perimeter

Washington Metropolitan Area Transit Authority Board Action/Information Summary

Building a Threat Intelligence Program

Securing Industrial Control Systems

SMART POLICING FOR SMALL AGENCIES. Increase Community Safety with Intelligent Maps and Analytics

Real estate predictions 2017 What changes lie ahead?

TRANSFORMING WEST MIDLANDS POLICE A BOLD NEW MODEL FOR POLICING

Vehicle Area Networks:

Transcription:

STUDY REVEALS GROWING DEMAND FOR HIGH-SPEED DATA COMMUNICATIONS 2013 PUBLIC SAFETY INDUSTRY STUDY Providing access to information to those who need it most, when they need it most, is on virtually every agency s agenda, no matter what their size or location. Driven by this desire to access and share data real-time video, suspect photos, database information and more the interest in mobile broadband is clearly shown in Motorola s recently completed 2013 public safety communications survey. The study also reveals the attention that government agencies are giving to cybersecurity and the devices that deliver data to the field. INCREASED INTEREST IN HIGH-SPEED DATA ACCESS Why is high-speed data access so important? It enables first responders to make more informed decisions to better serve the public and protect lives. While the Public Safety Industry Study survey conducted by Motorola in 2012 documented the emerging emphasis on data communications in public safety, the new 2013 study is notable for showing how quickly the trend of providing mobile broadband access in the field is escalating. Responses revealed that in the last year, the number of agencies acknowledging the importance of high-speed data to their future operations grew by more than 30 percent. GROWING IMPORTANCE OF VIDEO In light of the increasing importance of video in public safety operations exemplified by the identification of the Boston Marathon bombers the study asked respondents about their current and planned use of video. Not surprisingly, more than half of respondents noted that they currently use video solutions, including well over a quarter that are using mobile in-vehicle and/or wearable camera systems. ESCALATING THREATS TO SECURITY With the seemingly ever-increasing instances of security threats to government and public safety communications networks, the study also asked a number of security-oriented questions. Clearly, the industry is concerned about security breaches. Fully 64 percent of respondents felt their agency communications networks were at least somewhat vulnerable to cyber attacks. Only 12 percent believed their systems were not at all vulnerable to security breaches. MOBILE BROADBAND VIDEO SECURITY DEVICES DEVICE PROLIFERATION The survey provided updated information on the types of devices currently being used, or projected for use by first responders and other government workers. Not surprisingly, close to half of respondents said that their first responders use a mobile or smartphone on the job, whether the first responder s own personal phone or a unit issued by the department. Since bring your own device (BYOD) is a major issue for a wide range of agencies, the study somewhat surprisingly showed that less than a third of agencies actually had a BYOD policy in place.

THE FUTURE OF PUBLIC SAFETY COMMUNICATIONS INCREASED EMPHASIS ON MOBILE BROADBAND FOR DATA COMMUNICATIONS When asked to predict the most urgent future needs for their public safety agencies, 43 percent of respondents mentioned interoperable communications and high-speed data access; another 18 percent indicated that they would rely on mobile data communications as often as voice communications. Possibly driven by the work that FirstNet is doing to develop a nationwide public safety broadband network, study participants indicated a strong interest in providing real-time data access in the field. More than 62 percent of respondents acknowledge and are preparing for a future in which delivering real-time voice, data and video access to first responders, wherever they, are is mission critical. IN THE FUTURE, MY AGENCY NEEDS 23% 20% 18% 15% 14% 10% To easily communicate with agencies in the surrounding area, as well as with federal agencies High-speed data access in the field so that we can quickly get the information we need To rely on mobile data applications as often as we rely on voice communications Dispatch functionality for CAD and radio from the same dispatch workstation Local and national database access both in the field and in our primary locations Video surveillance systems to increase the eyes on the street and support field personnel SCENARIO 1: PUBLIC DISTURBANCE Two police officers respond to a public disturbance call at a notorious bar. As they arrive, the officers find themselves in the midst of a violent fight involving numerous individuals. Immediately calling for backup, the officers wade in and manage to break up the fight before there are serious injuries. As they interview suspects, one of the instigators has no valid identification and appears to be providing a false name. The individual does, however, have a distinctive facial tattoo. On a handheld computer, one officer accesses county criminal records, which also features a database of known tattoos. Getting a match, the officers find the suspect s real name and discover that he has four outstanding warrants, including one for attempted murder. He is immediately taken into custody and off the streets. 2

HIGH-SPEED DATA IS BECOMING A TRUE PRIORITY DATA VIEWED AS MISSION CRITICAL AS VOICE COMMUNICATIONS For first responders, enhanced situational awareness through immediate access to information live streaming video of incident scenes, current building schematics, location histories, criminal records and more is key to increasing public safety efficiency, effectiveness and above all, safety. For first responders in the field, realtime data communications are becoming as crucial as voice communications. In the survey, almost 45 percent of respondents believe that getting data messages through is equal in priority to getting voice messages through. And more than 90 percent believe that data messages are important. First responder expectations are also high. Only 12 percent of respondents said that their first responders do not expect data access to be available during an incident. 90% OF FIRST RESPONDERS BELIEVE THAT DATA MESSAGES ARE IMPORTANT TEXT PHOTO VIDEO REAL-TIME DATA FOR 9-1-1 CALL CENTERS TECHNOLOGY IS CHANGING HOW MISSION CRITICAL INFORMATION IS COLLECTED FROM THE PUBLIC There is no question that mobile broadband and the rise of the smartphone are beginning to impact emergency Public Safety Access Point (PSAP) and dispatch operations. More than 56% of American adults have an Internet-enabled smartphone 1 and many use them for applications like text messaging, taking and sharing photographs and capturing video. With research indicating that more than 70 percent of public safety agencies want the ability to use text messages and video from citizens, and 60 percent reporting that citizen-generated data has helped support response, 2 these particular applications have important implications for public safety. According to 2013 Motorola survey respondents, public safety agencies are in the beginning stages of being able to receive and make use of this data to improve situational awareness, and community and first responder safety. 70% OF PUBLIC SAFETY AGENCIES WANT THE ABILITY TO RETRIEVE VIDEO AND TEXT MESSAGES FROM CITIZENS 1 http://pewinternet.org/commentary/2012/february/pew-internet-mobile.aspx 2 Motorola Government and Public Safety Data Communication Survey, January- February 2012 3

DEVICES THAT DELIVER DATA TO THE FIELD FIRST RESPONDERS RELY ON A WIDE VARIETY OF INTERNET-ENABLED MOBILE DEVICES Participants in Motorola s 2013 survey make it clear that providing real-time data communications to first responders in the field is a top priority for virtually every public safety agency or department. Responding to questions about the types of devices currently being used to provide access to this important data, almost 80 percent noted they are using intelligent Internet-enabled devices such as smartphones, tablets, laptops and vehicle-mounted computers. When asked the major question of who is providing these smart devices are they agency-supplied or Bring Your Own Device (BYOD) responses show that close to half of first responders now use their own personal devices for work-related activities. They also show that more than 62 percent of agencies have no formal BYOD policy, and that of those that do have one, more than half specifically prohibit BYOD. Clearly, this is a practice that is still evolving. WHAT TYPES OF DATA DEVICES DO YOU, OR YOUR FIRST RESPONDERS, USE ON THE JOB? 26% SMARTPHONE 23% MOBILE PHONE 20% LAPTOP 17% IN-VEHICLE WORKSTATION 9% TABLET 5% HANDHELD RUGGED DEVICE WHO PROVIDES YOUR FIRST RESPONDERS WITH A SMARTPHONE/TABLET? 47% MY FIRST RESPONDERS USE A PERSONAL SMARTPHONE ON THE JOB 27% MY AGENCY PROVIDES SMARTPHONES FOR COMMAND STAFF 21% MY FIRST RESPONDERS DO NOT USE SMARTPHONES 5% MY AGENCY PROVIDES SMARTPHONES FOR ALL FIRST RESPONDERS WHAT IS YOUR AGENCY S POLICY TOWARD BRING YOUR OWN DEVICE (BYOD)? 63% NO FORMAL POLICY 15% POLICY PERMITS BYOD 18% POLICY PROHIBITS BYOD 4% WE PLAN ON IMPLEMENTING A POLICY THIS YEAR 4

A GROWING RELIANCE ON PUBLIC SAFETY VIDEO VIDEO APPLICATIONS DELIVER REAL-TIME SITUATIONAL AWARENESS The study confirms that video is fast becoming one of the most effective sources of information for public safety operations. Almost 58 percent of respondents indicated that their agencies use video solutions in some combination of fixed, mobile and in-vehicle video applications. The use of real-time video is also on the radar of many agencies. Although only about seven percent of respondents indicated they can currently send live video from in-vehicle camera systems, almost 30 percent said that they would definitely or probably implement streaming video in the next three years. The use of wearable cameras for incident documentation and first responder protection is also beginning to come into use, with more than 30 percent of respondents saying they either currently use, or are considering using, wearable video solutions. ONLY 7% OF AGENCIES SURVEYED CAN STREAM LIVE VIDEO FROM IN-VEHICLE CAMERAS DOES YOUR AGENCY UTILIZE VIDEO SOLUTIONS? 43% MY AGENCY DOES NOT UTILIZE VIDEO SOLUTIONS 25% MY AGENCY HAS A FIXED VIDEO SURVEILLANCE SYSTEM 27% MY AGENCY USES MOBILE, IN-VEHICLE CAMERA SYSTEMS 5% MY AGENCY USES WEARABLE CAMERAS SCENARIO 2: WAREHOUSE FIRE A passerby notifies a city s 9-1-1 center that flames are shooting out of the top floor of a large furniture manufacturing plant and warehouse building. As units are dispatched to the scene, first responders are able to view live video of the building from a number of street surveillance cameras, providing them with a real-time view of the scene as they approach. In addition, dispatch sends current building plans that show crucial locations, including hazardous chemical storage areas. The initial units arriving concentrate on keeping the blaze away from the chemicals. Other units use building plans detailing stairway locations and designated escape routes to escort employees on the upper floors to safety. The fire is contained to the premises, and is brought under control with only minor injuries, and with much of the company s inventory preserved. 5

PUBLIC SAFETY NETWORKS VULNERABLE SHARP INCREASES IN CYBER ATTACKS ON GOVERNMENT AGENCIES In the past six years, the number of cybersecurity incidents reported by government agencies has increased by nearly 680 percent. 3 Cyber attacks are on the rise, and public safety agencies are increasingly coming under attack by hackers whose intentions are not just to steal information, but to disrupt or even totally shut down public safety networks. The reality is, the BYOD phenomenon can exacerbate the situation by exposing government systems to private system vulnerabilities. Respondents are very aware of this threat. Well over 60 percent of respondents indicated that they believe their networks are at least somewhat vulnerable to these attacks, and almost 50 percent are at least somewhat likely to be implementing new security measures such as practices that establish concentric rings of protection for people, policy, process and technology in the next year. OVER 60% OF GOVERNMENT AGENCIES BELIEVE THEIR NETWORKS ARE VULNERABLE TO ATTACKS 12% NOT VULNERABLE IN YOUR OPINION, HOW VULNERABLE ARE YOUR PUBLIC SAFETY VOICE AND DATA NETWORKS TO SECURITY THREATS? 38% SOMEWHAT VULNERABLE 18% VULNERABLE 9% VERY VULNERABLE 23% DON T KNOW SCENARIO 3: NETWORK INTRUSION In the early hours of a morning, a cyber criminal hacks into a police network. Few things are potentially more disruptive for public safety agencies than dealing with a network intrusion. Whatever the hacker s intentions, you can be sure they are not good. Knowing that malware attacks are exploding and manually detecting an intrusion can be difficult and time consuming, the police department has already implemented powerful intrusion detection to protect networks and information. The system not only immediately detects the hacker s device, but automatically removes it from the network before any damage can be done. 3 http://www.gao.gov/assets/600/590367.pdf 6

KEY CHALLENGES FOR NEXT GENERATION COMMUNICATIONS NETWORKS BUDGET ISSUES LEAD THE LIST OF CHALLENGES TO IMPLEMENTING NEW TECHNOLOGY When considering challenges to achieving their public safety communications vision, almost 70 percent of survey respondents identified budget as their primary challenge, while 11 percent noted lack of resources and technical support. Another 10 percent of survey participants identified building consensus with surrounding agencies as a challenge. WHAT IS YOUR AGENCY S PRIMARY CHALLENGE TO ACHIEVING ITS NEXT GENERATION COMMUNICATION OPERATIONS VISION? 11% 10% 5% 3% 3% 1% Lack of resources and/or technical support Consensus with surrounding agencies These technologies aren t readily available to us Support from the local community System security We don t need new technology 68% Budget NEARLY 70% OF AGENCIES IDENTIFIED BUDGET AS THEIR PRIMARY CHALLENGE SCENARIO 4: FALSE COMPLAINT WITHDRAWN As an officer turns on his lights and sirens to pull over a driver for speeding and an expired license plate, his dashboard and wearable cameras automatically start recording video. Using his in-vehicle computer, he runs the plate through the county database and discovers that the car has been reported stolen. The officer calls for backup, and as it arrives, the driver begins to run away. After a short chase, the officer corrals the suspect and takes him into custody. At the station, the suspect claims abuse by the officer. Although the entire incident was out of range of the in-vehicle camera, the wearable camera video confirms that there was no abuse, and the suspect withdraws his complaint and is quickly booked. 7

SURVEY HIGHLIGHTS AND METHODOLOGY Study results reveal that the use of data communications continues to trend at a rapidly increasing pace, underscoring the mission critical importance of real-time data communications for first responders in the field. Respondents also provided new information on the proliferation of video as a mission critical public safety tool, with almost 60 percent of respondents reporting the use of video solutions. In addition, they acknowledged the growing threat of cyber attacks on public safety and other government networks, with almost half reporting they are at least somewhat likely to add additional security in the next year. Against the backdrop of the establishment of the FirstNet nationwide public safety broadband network, the 2013 Motorola Public Safety Industry Study establishes that there are both significant opportunities to take advantage of and significant communications issues that must be addressed. The need to provide first responders with high-speed data and voice communications in the field is seen as paramount. The survey also noted the increasing importance of multimedia, including the streaming of live video to and from the field and the ability of 9-1-1 centers to accept text messages, photographs and video. In addition, certain important policy decisions often remain to be made, especially those dealing with two essential issues: BYOD and network security. WHO RESPONDED TO THE SURVEY? The survey captured responses from a cross section of government professionals, with more than 40 percent coming from chiefs, deputy chiefs and first responders. 42% 32% 20% 6% GOVERNMENT ADMINISTRATION COMMAND STAFF FIRST RESPONDERS IT MANAGEMENT AGENCY SIZE BREAKDOWN: Survey respondents including public safety professionals from departments and agencies of varying strengths and sizes. 49% 17% 14% 8% 12% 50 EMPLOYEES OR LESS 51-100 EMPLOYEES 101-250 EMPLOYEES 251-750 EMPLOYEES OVER 750 EMPLOYEES With responses from more than 850 public safety professionals, Motorola s 2013 study offers a timely snapshot of the current state of public safety communications technology. The latest in our ongoing series examining the use of next generation technology in public safety, the 2013 study was conducted in February and March, following up on similar research fielded last year. Responses were collected from a wide variety of professionals, with more than 30 percent coming from chiefs and deputy chiefs. Others surveyed included department heads, managers, IT directors, police officers, firefighters, EMS and other public safety users and decision makers. The 2013 study is part of an ongoing Motorola research initiative to help identify and report on trends affecting communications technology in the public safety industry. For more information on planning and deploying a next generation public safety technology solution, talk with your Motorola representative or visit us on the Web at motorolasolutions.com/nextgen. Motorola Solutions, Inc. 1301 E. Algonquin Road, Schaumburg, Illinois 60196 U.S.A. motorolasolutions.com MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their respective owners. 2013 Motorola Solutions, Inc. All rights reserved. RO-36-108