recommended reading

FEMA weighs outfitting housing inspectors with smart phones

The Federal Emergency Management Agency is considering giving inspectors smart phones to make it easier to collect data on homes damaged by natural disasters.

According to a request for information posted on the Federal Business Opportunities Web site last month, FEMA is seeking information on how BlackBerrys and other smart phones could improve the residential inspection process. Mark Millican, deputy branch chief of FEMA's National Processing Service Center Operations, said the agency checks hundreds of thousands of homes annually, depending on the types of natural disasters that have occurred.

Inspectors currently carry laptop computers and separate cameras to verify damage. "Technology has evolved quite a lot since the implementation of the technology we're currently using," Millican said. "We see the advantage of potentially using BlackBerrys or similar devices and consolidating the current technologies we use today."

According to the request for information, inspectors check damaged residences room by room, recording the types of repairs needed and the amount of damage. Any smart phone that inspectors use must be compatible with FEMA's existing information management system, which organizes information in XML data tables. Several models of smart phones are capable of handling spreadsheets and other data applications that use XML.

FEMA also is interested in smart phones' Global Positioning System navigation feature, mapping applications and ability to stamp photos with a real-time date and location.

"Our inspectors typically are going into areas they're not familiar with and navigation can create an efficiency that will allow them to move between properties faster, inspect faster, provide better service and reduce the turnaround time between properties," Millican said. "We currently don't have that, frankly."

The Federal Business Opportunities notice indicates FEMA is considering leveraging commercial technologies rather than building something from scratch, according to Ray Bjorklund, chief knowledge officer and senior vice president at the research and consulting firm FedSources. This fits with a growing trend toward considering commercial options, he noted. President Obama, for example, is the first president to keep his own smart phone, a special-issue BlackBerry from the National Security Agency.

"This administration has been more aggressive in exploring advanced technologies like the Web 2.0" and smart phones, Bjorklund said. "Kudos to the government for saying we've got readily available technologies like our smart phones, maybe we could use this."

Millican said FEMA has not yet ruled out building its own device, but first wants to fully understand what already is available in the marketplace. "We're simply collecting information, getting some knowledge on the technology out there," he said. "We want better information before taking further steps."

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.