recommended reading

Undercover police used smartphones to keep tabs on protests in Tampa

Protestors marched during the Republican National Convention.

Protestors marched during the Republican National Convention. // Dave Martin/AP

A network that allowed undercover police to use smartphones and tablets to monitor and communicate during protests at the Republican National Convention is giving new meaning to having “eyes on the ground.”

Police have long maintained an undercover presence at major gatherings, including political protests — not to monitor free speech, they are quick to note, but to make sure everyone is safe.

At this year’s Republican National Convention in Tampa, police tried out a powerful new tool that can turn officers’ smartphones into multimedia surveillance and communication platforms. Emergency responders around the country think the use of this technology could be the wave of the future and Tampa provided what many see as a successful field test. Tools that are often featured in spy thrillers such as the Bourne Identity movies could eventually become widely available in local police stations.

In Tampa, emergency responders used specialized apps and software to turn off-the-shelf smartphones and tablets into tools for sending real-time video, voice, and data. The effort involved an interoperable network that used technology from several private companies.

That allowed undercover officers to transmit real-time video, for example, of protesters as they moved about the streets.

“The specialized applications gave law enforcement an advantage, allowing police officers to use everyday devices in a strategic and tactical way,” said Sgt. Dale Moushon, with the Intelligence Unit of the St. Petersburg Police Department, which helped bring the system to the area. Use of the network had not been publicized until now because police were wary of undermining security at the convention.

While undercover police in most protests are often easily identified by their earpieces or microphones in their sleeves, Moushon told National Journal that using cell phones allowed police to remain completely undetected. “Everyone has a phone, so officers blend in easier,” he said.

That also makes the situation safer for police officers, he said. The protests in Tampa never became as large as expected, nor did they get out of hand. But Moushon said that there were several instances where police were able to monitor potential trouble spots thanks to the network.

He also pointed to an instance in which an officer was preparing to take a picture of a suspicious person so staff could use facial-recognition software to identify the person. Instead, the person happened to pull out a document that included his identifying information that was then captured in real-time by the officer’s live video feed. “That saved us a lot of time,” Moushon said.

Law enforcement officers from Pinellas and Hillsborough counties used the next-generation broadband network to send “highly secure, encrypted voice, video, and data communications, as well as an evidence-quality, permanent recording of all data collected at the event,” according to the developers of the network. In addition, the system brought together fixed-surveillance camera feeds, live video transmitted from smartphones, global-positioning system information, and traditional radio traffic.

As technology has improved, firefighters, police, and medical personnel have been looking for ways to send each other videos, pictures, and other data, in addition to voice communication.

The network in Tampa was used with special permission from the Federal Communications Commission. It was part of an effort to eventually develop a similar $7 billion National Public Safety Broadband Network for everyday use across the country.

In addition to law-enforcement surveillance and communication, a future network could allow firefighters to transmit building plans to each other, or allow paramedics to review multimedia health records.

Besides a range of law-enforcement agencies, the Florida network was developed by a group of companies that included Nokia Siemens, Reality Mobile, Raytheon, and Cisco.

“Our project was a first step in an emerging era for enhanced communications and information sharing among public safety, law enforcement and other national-security officials,” Cisco Director of National Security Chris Josephs said in a statement.

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.