recommended reading

Government Data Saves Lives

A man sits atop a pile of rubble after a tornado came through Oklahoma in May.

A man sits atop a pile of rubble after a tornado came through Oklahoma in May. // Charlie Riedel/AP

The U.S. Air Force’s Civil Air Patrol takes thousands of aerial pictures following a natural disaster, but those images alone often aren’t sufficient to assess the full scale of damage to building and communities.

Imagine, though, if those images could be combined with geotagged pictures taken by disaster victims on the ground culled from Twitter, Flickr and Instagram.

That’s the dream of a team of short-term government technologists known as Presidential Innovation Fellows who are working with the Federal Emergency Management Agency on the project. The image database known as GeoQ could also be used to assess which roads into a disaster site are most passable, improving response times for emergency workers traveling in and out of disaster zones, said Jackie Kazil, a fellow working on the project.

“We could look at structures to see what it looks like for citizens on the ground and we could make decisions about where to put resources more quickly than we do today,” Kazil said.

Kazil outlined the fellow’s plans for GeoQ at the White House’s Safety DataPalooza on Tuesday, a conference devoted to using open government data to improve citizens’ safety. Many of the projects discussed at the conference grew out of the White House’s open data initiative, which aims to open up government-gathered data to the public in machine readable formats so developers can build Web and mobile tools with it.

The burgeoning open data market could ultimately grow the economy by up to $3 trillion annually, according to researchers, as companies, nonprofits and independent developers build useful new tools in sectors such as health care and energy.

Agencies announced several new open data initiatives during Tuesday’s event. Among them:

  • The Food and Drug Administration announced plans to open up numerous data sets, including about medication error reports.
  • The Labor Department announced plans for a “data jam” to use Occupational Safety and Health Administration data to reduce job-related hearing loss.
  • The Consumer Product Safety Commission announced a Safer Products App Challenge aimed at building tools to raise awareness of reports of product dangers submitted through

Get the Nextgov iPhone app to keep up with government technology news.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.