Risk

2/1/2009
01:46 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Video: Super Bowl Security

There will be about 250,000 people in Tampa, Fla., for the Super Bowl today. And while the FBI has reported that there are no credible terror threats for the game, one bet you're guaranteed to win today is that security will be tight.

There will be about 250,000 people in Tampa, Fla., for the Super Bowl today. And while the FBI has reported that there are no credible terror threats for the game, one bet you're guaranteed to win today is that security will be tight.Tampa is likely to be the safest place in the country today, with no terror threats and roughly two years of security planning for the game. Yet, the two-year plan will be tightening the air space over Raymond James Stadium to watching over the sea ports.

But no matter how many local, state, and federal agencies are there -- they need to be able to work together and coordinate their efforts should anything happen. As the lessons of hurricane Katrina have taught us, inter-agency communication is key.

A good part of that communication behind the security of the game today involves an application from Infusion Development called Falcon Eye, which works on Microsoft Surface to move through real-time, 3-D data. Falcon Eye is integrated with an application from E-Sponder that will help security agencies, law enforcement, and first responders track and report any security incidents at the game.

Let's hope it's not needed to be put to hard use. Here's a video showing how it looks:

<a href="http://video.msn.com/?mkt=en-US&playlist=videoByUuids:uuids:286ccd43-a8c8-4fd8-be1f-f942d4da016f&showPlaylist=true&from=msnvideo" target="_new" title="Super Bowl: Microsoft Surface helps police monitor security">Video: Super Bowl: Microsoft Surface helps police monitor security</a>

Now, if only I could get that on my iPhone . . .

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Cracking 2FA: How It's Done and How to Stay Safe
Kelly Sheridan, Staff Editor, Dark Reading,  5/17/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Shhh!  They're watching... And you have a laptop?  
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11403
PUBLISHED: 2018-05-24
DomainMod v4.09.03 has XSS via the assets/edit/account-owner.php oid parameter.
CVE-2018-11404
PUBLISHED: 2018-05-24
DomainMod v4.09.03 has XSS via the assets/edit/ssl-provider-account.php sslpaid parameter.
CVE-2018-11405
PUBLISHED: 2018-05-24
Kliqqi 2.0.2 has CSRF in admin/admin_users.php.
CVE-2018-11410
PUBLISHED: 2018-05-24
An issue was discovered in Liblouis 3.5.0. A invalid free in the compileRule function in compileTranslationTable.c allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
CVE-2018-11399
PUBLISHED: 2018-05-24
SimpliSafe Original has Unencrypted Sensor Transmissions, which allows physically proximate attackers to obtain potentially sensitive information about the specific times when alarm-system events occur.