Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
Boston Bombers Can't Elude City's Tech Infrastructure
Video surveillance played a key role in identifying the suspects in Monday's tragic Boston Marathon bombing, setting a precedent for increasing use of sophisticated security IT systems nationwide.
April 19, 2013
6 Min Read
We don't yet have a conclusive report on the data gathered and analyzed in the aftermath of the Boston Marathon bombings on Monday, but this much we do know: Video surveillance and other information technologies played a huge role in identifying the two main suspects, one of whom was killed by police early Friday morning amid a shootout.
In fact, the city's Office of Arts, Tourism and Special Events was testing a new operations dashboard from IBM on April 15, the day of the marathon, and Boston CIO Bill Oates was on hand to oversee its use.
Oates talked to InformationWeek contributor Michael Fitzgerald that morning from Boston's call center on the eighth floor of City Hall, where he and IT staffers were able to view on a monitor the marathon route and a two-block span around it. At the time, just a few hours before the bombings, Oates said the goal was to use the marathon "to get a sense of what the system is going to show us, so we can look at leveraging how to improve our coordination of events."
The system wasn't available to police and emergency management officials in their event-control trailers near the finish line. But the city does plan to add 911 data and potentially video surveillance feeds in the future, Oates said. "Following the event, we'll be able to go to all the folks that have planned and operate the event and show them what's in this system so they can think about it," he said on Monday morning.
[ Beware of hackers who exploit tragedy for malicious purposes. Read Malware Attackers Exploit Boston Marathon Bombing. ]
In the wake of the terrorist attack, the data gathered by Boston's operational dashboard could be invaluable. Oates certainly had high expectations that it would help the city plan, coordinate and manage the marathon more effectively. "It's the city's job to make sure all goes according to plan," he said in a blog post on the morning of the marathon.
Among the challenges to be addressed, Oates wrote, "How many emergency personnel will we need, and where do we place them?" That blog post has since been taken down from the IBM website where it appeared. InformationWeek hasn't been able to reach Oates to ask about how the operational dashboard performed or whether data useful to the investigation was generated.
Video recorded in the vicinity of the explosions provided important clues to law enforcement. On April 18, the FBI distributed a video clip and still images in hopes of identifying two suspects, now identified as brothers from Chechnya: Tamerlan Tsarnaev, 26, the man killed by police Friday morning, and Dzhokhar A. Tsarnaev, 19, who as of this writing was still on the run.
In recent years, cities worldwide have been investing in video surveillance in an attempt to lower crime and improve public safety. The Boston Police Department in 2010 opened a "real-time crime center" that gets video feeds from dozens of street cameras positioned across the city. During the center's unveiling, the police demonstrated how they used video from a closed-circuit TV camera to arrest suspects in a shooting incident.
Boston is now expanding its smart city initiative with sensors, predictive analytics software from IBM and performance-reporting software from SAP. In recent years, Boston has expanded the number of surveillance cameras on its street corners, under its bridges and in its local shopping areas, according to The Boston Globe.
In the wake of the 9/11 terrorist attacks, Baltimore, Chicago, Dallas, New York, San Francisco and other U.S. cities have done the same, often with funding from the federal government. Municipal IT pros tend to favor broader use of cameras and related technologies. 58% of respondents to InformationWeek Government's Future Cites Survey, completed in October by 198 municipal IT pros, say that cameras, motion sensors and other public safety devices have high potential for improving city operations and performance.
Video surveillance on city streets is increasingly being used to deter and solve criminal activity. Scotland Yard used video footage to identify suspects in 2011 when rioters wreaked havoc on the streets of London and other English cities after the shooting death of a man who had traded gunfire with police. Last year, the New York Police Department used video to identify, arrest and charge a Staten Island man -- dubbed John Doe Duffel Bag because he was seen in pictures carrying a duffel bag -- in the slayings of three Brooklyn store owners.
New York City is deploying a full-scale surveillance system, the Domain Awareness System, that pulls in data from 3,000 closed-circuit TVs, 2,600 radiation detectors and 100 license plate readers. Microsoft, which developed the system with the NYPD's Intelligence Division and Counter-Terrorism Bureau, is marketing the platform to other municipalities. The day after the Boston bombings, New York Mayor Michael Bloomberg outlined steps his administration has taken to guard against similar attacks. "Our camera network now has the capacity to alert police to abnormalities it detects on the street, such as an abandoned package that is left on a corner," he said.
Inevitably, the rising number of street cameras feeding into police nerve centers raises cries of Big Brother from privacy watchdogs. In Seattle, activists earlier this year destroyed more than a dozen security cameras to protest the city's growing surveillance network.
But the Boston attack and the effectiveness of video in identifying the suspects provide a clear message to mayors and CIOs that they can't be deterred from taking additional steps to prevent and respond to acts of terrorism as well as everyday crimes. And there's more that city officials can and must do.
Facial recognition, analytics and other advanced technologies can sift for signs of trouble in real time. IBM, as part of its Smarter Public Safety line of products, sells a video correlation and analysis suite that offers real-time alerts, facial recognition and "situational awareness" of a location. The FBI is developing facial recognition capabilities as part of its $1 billion Next Generation Identification program.
At the same time, city officials must be transparent about their use of surveillance technologies. In January, Kratos Defense & Security Solutions, which counts the Pentagon and the Department of Homeland Security among its clients, announced it had received an $18 million contract to install a municipal transportation security and surveillance system for "one of the largest municipalities in the United States, located in the Northeast." Such obfuscation is what makes people nervous.
Yet, as Boston reminds us, cities must take decisive action. Responsible use of video surveillance is part of the answer.
A well-defended perimeter is only half the battle in securing the government's IT environments. Agencies must also protect their most valuable data. Also in the new, all-digital Secure The Data Center issue of InformationWeek Government: The White House's gun control efforts are at risk of failure because the Bureau of Alcohol, Tobacco, Firearms and Explosives' outdated Firearms Tracing System is in need of an upgrade. (Free registration required.)
About the Author(s)
You May Also Like
Your Everywhere Security guide: Four steps to stop cyberattacksFeb 27, 2024
Your Everywhere Security Guide: 4 Steps to Stop CyberattacksFeb 27, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
API Security: Protecting Your Application's Attack SurfaceFeb 29, 2024
Securing the Software Development Life Cycle from Start to FinishMar 06, 2024
Laptop with ransomware, and bitcoin in the palm of a man's hand to illustrate ransomwareCyberattacks & Data Breaches