Threat mitigation and response systems need to be flexible in order to adequately manage the diverse situations in which they are likely to be deployed. A critical aspect of providing this flexibility is the ability of a system to incorporate legacy, current and new components.
The GPAC System™ is one of the best and most innovative tools currently available.
Before an incident unfolds, the GPAC System™ is utilized to establish baselines – ‘normal’ human behavior, air quality etc. Deviations from established baselines indicate an incident or possible breach. As an Early Warning System (EWS), alerts are sent out in real-time to responsible personnel and corresponding control actions initiated.
During an incident – as the event unfolds, the same tool, the GPAC System™ is further utilized to monitor the situation, undertake corrective measures and share information with respective agencies in real-time. Time and resources is wasted while crowd sourcing and waiting for the public to post to social media outlets.
Post the incident, captured and stored information on the GPAC System™ in the form of database logs and forensics can be rapidly analyzed and used to mitigate other related incidents, for training purposes and to obtain successful convictions in criminal cases.
Sensors data is persistently captured by the GPAC System™. Many systems face challenges in providing persistent surveillance, but the GPAC System™ configuration achieves this by ensuring responses are only triggered when sensor data transcend trigger values. An example is when video is recorded and stored only when sensor data does not conform to established baselines. This compares with the inefficiency of needing cameras to run all of the time in the hope of capturing threatening activity.
Commercial multi-vendor off-the-shelf (COTS) or non-COTS sensor components can be used. This improves on the proprietary model, which is restricted to components that can often be difficult or expensive to source. Instead, components are not only in ready supply but the best-of-breed can be put to use. Hastily Formed Networks (HFN) can be deployed and a diverse range of field equipments/sensors/cameras can be added to the network without expensive engineers and engineering and new technology can be included as soon as it is commercially available.
Wireless sensor network
Web protocol TCP/IP connects sensors to the central the GPAC System™ – the brains! This creates efficient affordable permanent and temporary sensor networks that are readily connected via a router to a host computer running the GPAC System(TM) which runs on open architecture and is accessed via a web browser. Thus, mobile patrols and in-field-personnel can access the system via a web browser from any web-enabled device. The need for highly qualified dispatch coordinators and operators is quickly determined and possibly eliminated as remote personnel from HQ have direct access to on-scene-data in real-time. HQ personnel and field operators are no longer limited to relying on radio communication to keep one another up to date.
Multiple sensor readings trigger multiple response policies and actions. Situational awareness escalations are generated automatically. The ease of adding sensors, and the real-time response of the GPAC System™ makes highly calibrated and refined responses possible. When sensor signals are received, they are classified based on adaptive preset thresholds. The GPAC System™ logs the sensor input, and effectively generates additional records of events by triggering external actions like physical enunciations (lights, sirens, open/close doors and vents ….etc.), sending email, SMS and/or MMS to pre-configured recipients. Logs can be later analyzed and used in training and to obtain successful convictions in criminal cases.
Informed and rapid decision-making
Threat events being monitored and handled by the GPAC System™ enabled patrols that are responding to an event in real-time can be supported by a mobile command center equipped with Internet capability. In this way, patrols can be coordinated by senior commanders and support from domain experts provided from anywhere at anytime.
For a confidential discussion of your threat monitoring and response requirements, contact us.