Todd’s NPR Interview on Tragic Navy Yard Mass Shooting

NPR

Click here to listen to the September 17, 2013 interview. Transcript below is for “The Navy Yard Shootings: Coordinating A Response And Healing Hearts”

MR. KOJO NNAMDI

From WAMU 88.5 at American University in Washington welcome to “The Kojo Nnamdi Show,” connecting your neighborhood with the world… yesterday tragedy came to our town. A former Navy Reservist and current defense contractor opened fire at Washington’s historic Navy Yard on the bank of the Anacostia River turning a routine business-as-usual September Monday into a day full of law enforcement and emergency medical activity and anxiety.

MR. KOJO NNAMDI

13:07:34
And for a dozen families, the ultimate heartache as they learned of lost loved ones. We’ll be talking later with WAMU 88.5 reporter Elliott Francis about a memorial service today. But first responders from an alphabet soup of local and federal agencies responded in full force. Here to explain how agencies coordinate and make split-second decisions when responding to an active shooter emergency is Todd Jasper. He joins us by phone.

MR. KOJO NNAMDI

13:08:02
Todd Jasper is an associate director of the Homeland Security and Emergency Management Vision at MSA, a consulting firm here in Washington. He’s also vice-chair of the Emerging Technology Caucus for the International Association of Emergency Managers and the education director for the Metropolitan Washington Association of Contingency Planners. Todd Jasper, thank you for joining us.

MR. TODD JASPER

13:08:25
Pleasure to be here.

NNAMDI

13:08:26
Todd, yesterday workers at the Navy Yard and several nearby buildings were told to shelter in place, which may have been counter to some instincts to flee. How was a decision like that, which seemed so crucially important, made in a very short space of time?

JASPER

13:08:42
Great question. You can imagine it’s extraordinarily complex because you have multiple things happening at the same time. And what I suspect, if I understand correctly, certain folks in certain buildings were instructed to shelter in place. Or sometimes we might be familiar with the term lockdown. And then others were definitely told by law enforcement on bullhorns or as SWAT teams entered the buildings to come out if you can. And that actually constitutes a sea change in emergency management in outreach to folks about active shooters since Columbine.

JASPER

13:09:19
So we no longer really — the guidance from DHS, Department of Homeland Security, is if you can get out you ought to immediately if you sense there’s an active shooter in your midst. And I think that’s what people did yesterday. You saw a lot of folks streaming out very quickly. And then other folks who were deemed in kind of a safer area — at a certain point Navy Yard became one of the safest areas to be in D.C. with so many law enforcement there — but so you had other folks being told to stay where they were so that they weren’t in a crossfire or out in the open if they didn’t have to be.

NNAMDI

13:09:50
Are military installations in some ways uniquely prepared to handle a situation like this?

JASPER

13:09:56
They’re unique in many ways. It’s a great question too. Sure. they have their own police force, as you can imagine. They have strict boundaries where it’s clear, you know, how they’re separated from the rest of the city. They have many checkpoints. They’re very secure in many ways that most private companies or corporations couldn’t mimic without great costs of time and productivity.

NNAMDI

13:10:23
When we see so many agencies converge on the scene of an event like we did yesterday, Metropolitan Police Department, military police, FBI, NCIS, park service police, how do they coordinate with another?

JASPER

13:10:37
It’s extraordinarily complex and it really gets to — it becomes more than just normal fire calls or normal police calls at that point. It becomes a whole organizational structure. And in the federal government, especially since 9/11, we have what’s called the National Incident Management System or NIMS and Incident Command System or ICS. And agencies across the country, it’s a requirement that they teach their officers and their firefighters and response teams this whole organizational structure so that you can have really complex ad hoc organization under extremely stressful circumstances so that they can come together seamlessly and have terrific results, which I think we saw yesterday.

JASPER

13:11:21
We saw police officers running into the gunfire immediately. I mean, there’s no hesitation and they all worked with one another very, very well. And so it’s absolutely obvious. You know, you saw the officer being airlifted off the roof by the park police. That was also an MPD officer who was injured. And you had FBI SWAT team respond very quickly. So you had a lot of the agencies working together very, very quickly with good results.

NNAMDI

13:11:46
Well, we remember after 9/11 here in Washington there was a lot of complaint about not enough interagency coordination. That problem seems to have been solved, Todd.

JASPER

13:11:56
It’s a good question. It’s a good point. We’ve worked very hard at it. this whole industry, this whole field has put a lot of resources into it. It’s not perfect as a process. It’s a continuum. We’re always working on trying to get better at it. But there’s a lot of training and exercises the departments go through. D.C. is kind of unique too because we have so many agencies all at once that respond to incidents like this, between secret service, FBI. And then you have local police. I mean, in D.C. even the public library has its own police department and everyone responds together on a routine basis to that’s really important.

NNAMDI

13:12:28
Todd Jasper is an associate director of the Homeland Security and Emergency Management Vision at MSA, a consulting firm here in Washington. He joins us by phone. Todd, there has been some surprise that a secure base could be the site of such a violent tragedy. Do you think that the security measures in place on the installation will ultimately end up being a boon for investigators?

JASPER

13:12:52
It’s going to be very difficult because unless we’re searching every single person, every single car, every single article that enters any facility — and I don’t want to speculate based on their procedures at Navy Yard. As far as I understand it was very secure. But we always make — it’s a balancing act. And it’s constantly being reviewed. I know that base security — installation security is constantly going through threat assessment and hazard assessment and vulnerability assessment to make sure that all your bases are covered.

JASPER

13:13:26
And I think obviously every time there’s an attack, every time there’s an incident we review those assessments. But it’s very difficult because every time we let our guard down a little bit or we relax some procedures because it takes too long or spends — costs too much money, we have an attack eventually and we have to reevaluate. But I don’t have any information to suggest that Navy Yard wasn’t as secure as it could have been. I have every confidence that it was. It was very secure there.

NNAMDI

13:13:53
In today’s newspaper we saw SWAT officers on cell phones as they walked up to the Navy Yard. What kind of tech tools are deployed in a situation like the one we saw yesterday?

JASPER

13:14:03
Well, it’s — it goes across the spectrum. I don’t know exactly what — if they had certain apps or if they had maps on their phones that they were able to pull up. Sometimes — you have to understand, police officers, just like you and I, we all have Smartphones now. It’s possible to get messages or pictures or text messages. You can imagine during an incident like this, you have so much radio traffic and so many people calling out orders that a lot of times you can’t get on the radio yourself to ask for a question or give information. You might have to wait quite a bit.

JASPER

13:14:38
But if you could send a text message to a colleague in the command bus, you might have a quicker response. And so all means of communication are being used now in a modern incident.

NNAMDI

13:14:48
As we continue to learn more about what exactly happened yesterday, Todd, and as investigators try to piece together a motive, what will you be keeping your eyes and ears open for?

JASPER

13:15:00
One of the things I focus on the most is understanding as institutions how we can better prepare our people to respond to an incident of this magnitude or to prepare for an incident of the magnitude. To make sure that we give our folks the absolute best information in the most easily understood way. We want to avoid confusion at all costs because we want to save lives when seconds matter. So that’s — in the emergency management field that’s what we spend a lot of our time doing is going through these after-action reviews is what we call them, and looking at how we could better prepare our own institutions to make sure that they — everyone has the information they need to act accordingly.

NNAMDI

13:15:48
And thank you for doing it. Todd Jasper, thank you for joining us.

JASPER

13:15:51
My pleasure.

NNAMDI

13:15:51
Todd Japser’s associate director of the Homeland Security and Emergency Management Vision at MSA, a consulting firm here in Washington. In addition to many questions that remain after the shootings yesterday, there is also much grief.

5 Reasons Your Agency Should Have a Smartphone App

July 2013 IAEM Bulletin graphic

“There’s an app for that” has become a very popular phrase–and not just from teenagers. Apps (short for applications) are programs designed to run on smartphones and/or tablets–even without a phone or data connection. In January, Apple announced that they have sold over 40 billion apps for their iOS devices (such as the iPhone and iPad). Clearly apps are a huge part of information-sharing and reaching our target population, here are some reasons why your agency should considered designing and developing your own app:

 1. Apps are popular

In June 2013, the Pew Research Center reported its findings that 56% of Americans have smartphones capable of downloading apps–up from just 35% in 2011. Additionally, the number of Americans without a cell phone is down to just 9% of the population. According to research from New Relic, the average smartphone has over three dozen apps (forty-one to be exact) and the average smartphone user checks her phone 150 times per day with 127 minutes per day spent on apps. It is estimated that by the end of 2013, there will be 1.82 billion active smartphones globally and within the next two years, almost 100 billion apps are predicted to have been downloaded by smartphone users.

2. Keep your constituents informed

Unlike a webpage, when content or information is updated in an app, the app can send an alert to the smartphone user to acknowledge the update (also called “push” alerts). During an emergency, it is possible to also send direct messages to users through the app. While not robust enough for a sole means of emergency notification, push alerts or push notifications can be one of the tools emergency managers use for notifying the public. Additionally, if your agency includes plans in its app, app users will always have the most up-to-date plans. When posted on the internet, users can sometimes stumble upon an older version of a plan that has been saved by a search engine or re-posted by local groups, etc. With an app, there is unfiltered access to the most up-to-date information (without the fear of cached versions of older plans recirculating during an emergency).

3. Productivity without connectivity

When disconnected from wifi or wireless data feeds, apps can still function because they have the ability to save information to a user’s smartphone from the previous time an update was downloaded or a connection was available. If your agency wishes to provide any type of guidance for constituents if wireless connectivity is degraded, apps are a good solution. For items like evacuation routes, shelter guides, checklists, and other steady-state documentation, the apps can include those documents and simply update any of the documentation when the user connects to the internet–yet still maintains a copy on the user’s smartphone for when internet connectivity is unavailable.

4. Longer Reach

Since almost all smartphone users keep their phones nearby (how else would they be able to check their phones 150 times per day?), the smartphone is a better targeted device for distributing information than a laptop or desktop computer. Apps are built for ease of use–especially in transit or on the go. For emergency managers, our intended audience during an emergency are those constituents who can be empowered with the right information to help themselves and their community. Oftentimes, information is needed immediately–not when a person can find a computer nearby. Thus, the app is a perfect way of presenting actionable, executable information in a timely manner in a reliable format.

 5. Deeper Integration

As the operating systems (OS) of mobile devices become more advanced, apps are becoming better integrated with other programs on smartphones, such as maps, the address book, GPS, text messaging, and social media. The benefit of emergency management apps would be the deeper integration with other platforms. In a large-scale disaster, an emergency management app could open up a smartphone’s maps app to plot a course to safety. Once safe, an emergency management app could recommend using social media (rather than a phone call–which ties up limited bandwidth) to let family members and friends know that the user is safe. Deeper integration with reminders, calendar appointments, and other future mobile platform developments can serve to promote preparedness, enhance dynamic, safe responses, and encourage more robust recovery from disaster.

Screenshot 2012.09.07 12.06.45

While not every emergency management agency is ready to release their own app, agencies such as Washington, DC’s Homeland Security and Emergency Management Agency (HSEMA), Virginia’s Department of Emergency Management (VDEM), and even FEMA have already released apps for specific use during emergencies. Will your agency be next?

Intro to IAEM Emerging Technologies Caucus (ETC)

Screen Shot 2013-06-26 at 6.27.25 PM

When emergency managers are able to utilize the latest technology tools and resources, we are afforded new opportunities to enhance resiliency and truly engage with the communities we serve. In recognition of the pace of technology transformation and its impact on our work, the International Association of Emergency Managers established the Emerging Technology Caucus or “IAEM-ETC”.  The IAME-ETC seeks to shepherd in new technologies through educational outreach, and help practitioners increase awareness, acceptance and proficiency.  Per our mission, we will “research, evaluate, and make recommendations on new and innovative technology as they pertain to emergency management processes, and disseminate best practices to the broader emergency management community”. Caucus members are comprised of practitioners from a myriad of unique disciplines with representation from all levels of government, non-profit organizations, and the private sector.

The use of technology in emergency management is rapidly evolving; two of the most recent examples are the crowd-sourced web-based FEMA Think Tank, and the mass proliferation of social media. Initiatives such as these are why the focus of the IAEM-ETC is intentionally broad, some of our areas of interest are: investigating methods of integrating social media into the Incident Command System, examining the impact of the federal Integrated Public Alert and Warning System or “IPAWS” on local notification systems, leveraging mobile technology to manage incidents and reach impacted populations, and identifying cost-effective strategies for implementing new technology systems. It is our collective hope that this work will enhance preparedness by facilitating greater acceptance and proficiency with next generation technologies. We are honored to be part of the IAEM community and look forward to your input on which technology concepts you would like us to explore.

A Cross-Disciplinary Approach to Preventing Active Shooter Incidents

Screen Shot 2013-06-26 at 5.11.17 AM

From an outsider’s perspective, Sandy Hook Elementary school did everything right. They practiced active shooter drills, locked the campus doors every morning after 9:30 AM, and relied on an access control system. As the nation’s schools review their physical security and safety procedures following the horrific incident in Connecticut, it is important for emergency management not solely rely on protection strategies, but to consider prevention techniques as well.

As defined in the National Preparedness Goal, prevention includes “capabilities necessaryNational Preparedness Goal-resized-600 to avoid, prevent, or stop a threatened or actual act of terrorism…” On the other hand, protection includes the capabilities to “safeguard the homeland against acts of terrorism…” Since the Federal definition of terrorism requires that the act include political motivations, active shooter incidents usually cannot be labeled terrorism. While active shooting incidents may not neatly fit the definition of terrorism, active shooter incidents are criminal acts intended to cause terrorism in their randomly chosen victims. Clearly, our best defenses are not limited to infrastructure protection and additional physical security.

Technological advances in security are often the easiest solutions to identify following a horrific killing spree. However, a significant root cause of these active shooting incidents appears to be mental illness. This means that the emergency management field is forced to intersect with mental health awareness, physical security, and proper training and outreach to our constituencies. It is no longer enough or acceptable to simply rely on physical security and active shooter response training to keep everyone safe.

Similar to how emergency management has partnered with the public health field, it is also time for the emergency management field to partner with mental health professionals to develop awareness briefings and active shooter prevention programs and seminars.

 Can We Prevent Active Shooter Incidents?

According to a US Secret Service report, over 90% of “attackers engage in some behavior prior to the attack that cause others–school officials, parents, teachers, police,secret_Service fellow students–to be concerned”. From the same report we learn that in “nearly two thirds of attacks, more than one person had information about the attack before it occurred.”

These two statistics reveal that in the majority of cases, potential active shooters either told someone about their planned attack or engaged in behavior that might have signaled their intent. This means that the majority of active shooter incidents can be prevented—but it requires training for non-mental health professionals to understand the signs and to feel comfortable reporting a potential active shooter to the proper authorities.

While we normally consider active shooters to be “loners” or isolated individuals, the statistics show that active shooters typically tell others about their plans. In one case, a student told over 20 other people of his plans—yet no one reported it to law enforcement or school officials. When the student came to school, the US Secret Service report explains, “24 students were on the mezzanine waiting for the attack to begin.” It is unbelievable to think that active shooters are indicating their intent to conduct an attack and those that hear of the attack are not informing law enforcement—but that is exactly what several case studies regarding active shooters illustrate.

After the Sandy Hook massacre, as schools and other buildings improve their physical protection systems and infrastructure, the emergency management field ought to be pushing for active shooter prevention and mental illness awareness training. We all must be vigilant of the signs and warning indicators that an individual may turn violent and we all must know how to properly report such warning signs.

Many schools have Behavioral Intervention Team (BIT), which monitor reports of concerning or problematic patterns of behavior. However, the BIT has a negative stigma attached to it. For example, as the director of public safety at a community college recently explained, a student stole an item from a classroom and was demonstrating problematic behavior. When public safety officers arrested the student, the professor was advised to submit the student’s conduct for BIT review. The professor declined to report the behavior to the BIT because the professor explained that she did not want the student to get into more trouble. In most institutions, BIT are non-punitive and cannot lead to a student receiving additional punishment. Yet, the stigma surrounding mental illness and BIT are major factors for warning indicators and problematic behavior to go unreported or under-reported.

As the emergency management field reflects on recent and past active shooter incidents and pledges to do more to stop future attacks, our field must elevate prevention campaigns to work seamlessly with additional protection strategies. It is time for the Whole Community to embrace prevention and protection strategies; our safety depends on it.

IAEM Emerging Technology Caucus Introduces Crisis Technology Center

Screen Shot 2013-06-25 at 6.03.16 PM

For the first time, the IAEM conference last month debuted the Crisis Technology Center (CTC). Throughout this year’s IAEM conference in Orlando, the Emerging Technology Caucus (ETC) set-up and staffed the CTC to answer technology questions, provide support for the IAEM2Go mobile application (or app), and to generally improve understanding and adoption of social media and other emerging technology in the emergency management field. Members of the ETC wore green ribbons that proclaimed “Techspert”, with the intent being to invite conference goers to feel comfortable approaching the Techsperts with technology questions.

The CTC provided the opportunity for Techsperts to converse with their emergency management colleagues about social media, new technology, and share lessons learned and best practices. Of course, as mentioned in a many sessions during this year’s conference, social media was a very popular topic and tended to be the most popular question posed to the Techsperts. The ETC had a total of fourteen Techspert volunteers comprising of a 50/50 split between Emerging Technology Caucus and Student Caucus members. The Techsperts are experts from various fields and unique disciplines, such as local emergency management, federal public health, and even regional volunteer coordination.

The booth provided conference goers with several benefits, such as live tracking of Hurricane Sandy, a visual presentation of the most popular tweets about the conference, and an open forum for technology questions. Social media, particularly Twitter, was even more prolific this year. At the end of the conference, at least 1,057 tweets were sent using conference hashtags. Indeed, a several conference goers even “live-tweeted” sessions. “Live-tweeting” is defined by Twitter as “to engage on Twitter for a continuous period of time—anywhere from 20 minutes to a few hours—with a sequence of focused Tweets.” While attending certain sessions, some Techsperts would rapidly post several tweets describing the session, pointing out important points, and providing other data and statistics to anyone following the session remotely.

Aside from introducing the concept of Twitter (since the majority of Techsperts were graduates of the National Disaster Preparedness Training Center social media course), Techsperts could help agencies and individuals establish maintain both their personal profile and Facebook page for their agencies. Emergency managers who lacked familiarity or comfort with social media were given an opportunity to meet with Techsperts who have experience using social media in disasters.

Additionally, the Emerging Technology Caucus–having just celebrated its one-year anniversary–used the Crisis Technology Center as an opportunity to build camaraderie and team unity. Since most of the ETC members only know each other through social media, getting a chance to meet in person is somewhat of a surreal experience. Oftentimes it is surprising to meet an individual that seems ordinarily reserved on Twitter, only to discover that the person is actually a social butterfly (or vice versa). Affectionately called the “Nerd Herd”, through service to the IAEM community, the ETC became a stronger team.

As Mackenzie-Anne Kelly, a volunteer Techspert and member of the Emergency Technology Caucus, explains, “At the end of the conference, it was clear that the Crisis Technology Center bridged gaps across all levels of emergency management and helped create a common understanding that everyone in each level of emergency manager plays an important role during any phase of emergency management.”

 

New Rumor Control Methods Developed During Superstorm Sandy

Screen Shot 2013-06-25 at 5.46.04 AM

In the past few years, the role of social media during emergent incidents has become increasingly more prominent.  This past October, as super-storm Sandy struck New York City, several tweets provided cause for concern. “BREAKING: Confirmed flooding on [New York Stock Exchange]. The trading floor is flooded under more than 3 feet of water”, said one tweet. “comfortablysmug-tweets1Con Edison has begun shutting down all power in Manhattan”, read another. Those tweets, along with dozens of other posts and rumors, turned out to be completely false.  Another example, documented by the Chicago Tribune, included “fake images… including a picture of a storm cloud gathering dramatically over the Statue of Liberty and a photoshopped [image] of a shark lurking in a submerged residential neighborhood”. For most social media users, sharing a picture over multiple systems and platforms is as simple as tapping a few buttons, the speed at which data can be shared within a global network of users can facilitate the spread of hoax messaging.  

Statue+of+Liberty+Twitter+pic shark-hurricane-sandy-3Upon initial inspection, the quality of some doctored photos are stunning and even the sharpest skeptic can mistake a fake picture as genuine.  Fortunately, visual examination is only one method of verification.  Reverse image search engine TinEye, provide a better gauge of image authenticity.  By uploading or linking the suspicious image to http://www.TinEye.com, users are able to see where that image, or a similar version, has been posted in the past.  In a few clicks, communications and situational awareness teams can quickly debunk a bogus picture post.

The need for an accurate representation of the scale and impact of a disaster is crucial, not just to first responders, but also to the public who needs current and factual information in order to regain a feeling of control over the situation.  At the Federal level, FEMA’s external affairs personnel began to take notice of the misinformation and began to formulate a plan to combat the more prominent hoaxes. Peter Herrick, a FEMA external affairs specialist, explained that “we began to see reports…which stated that FEMA was hiring volunteers at a rate of $1000 per week”. After confirming that those reports were fake, Mr. Herrick explained that the reality set in that “…there would be numerous scams and misinformation about FEMA and it’s programs that would circulate as a result of this large-scale disaster.” 
FEMA rumor control pic

When discussing one of the mitigation techniques deployed by FEMA, Mr. Herrick noted that “…after many discussions this transformed into the ‘rumor control’ movement that FEMA received praise for as the response continued. This campaign was used on social media via Twitter and Facebook through the use of the tagline RUMOR CONTROL and in the creation of the rumor control page on http://www.FEMA.gov.” The website simply provides a synopsis of current myths or scams alongside FEMA rebuttals and actual, helpful information. For example, FEMA stated: “…recent blog posts and social media traffic expressing that FEMA is out of bottled water.  This is false.” The FEMA entry further clarifies that “We are providing water to our state partners for distribution.  For New York locations and times of food and water distribution centers and daytime warming centers, visit www.nyc.gov”.
cb401030c2a44ca6949c884

FEMA’s rumor control strategy was simple and effective at identifying rumors, disproving them and providing factual information in their place.  Speculations and questionable reports were posted on a designated website ( http://www.fema.gov/hurricane-sandy-rumor-control ); falsehoods were clearly marked with a red “X” while facts were marked with a green check-mark. An added benefit to the system, was the ability for media outlets to vet citizen-reports, which in turn, further assisted in quashing misinformation and preventing accidental rebroadcasts of false accounts.

It is an unfortunate reality that some individuals will take advantage of the vulnerable and needy following a crisis.  Numerous scamshave been well-documented and FEMA has been equally dedicated in their efforts to prevent their recurrence. For instance, one scam profiled in a FEMA press outlined how “a resident was asked by phone to send the caller, posing as a FEMA representative, a $250 check to process a $5,000 disaster assistance check from FEMA.” In fact, the caller was not associated with FEMA and the entire episode serves as a warning to others to be on the alert for scam artists masquerading as disaster assistance volunteers and staff.

Super-storm Sandy is one of, what will undoubtedly be dozens of, disasters that will test our rumor control tactics.  For local emergency managers, it can be heartening to see partners at the Federal level leading the charge to develop and test these new methods. As technology evolves and the public becomes increasingly reliant upon mobile devices and social media for real-timenews before, during, and after an incident, so too must our ability to quickly combat misinformation and communicate the truth.

 

Digital Lessons Learned from Super Storm Sandy

Screen Shot 2013-06-24 at 6.59.59 AM

Perhaps due to the location of Super Storm Sandy and the incredibly media savvy and connected population in New York and New Jersey, social media quickly became the story as images of flooding and damage were immediately publicized. In Sandy’s aftermath, international groups of emergency managers focusing on the use of social media in disasters discussed some of the lessons learned. As Jenny Sokatch, of the DHS Lessons Learned Information Sharing system, explains, “These chats (as well as the #smem hashtag) helped us identify creative ideas and innovative practices used during Sandy that we may not have originally included in out lessons learned information sharing system, LLIS.gov.”

llis banner

The following key concepts were refined from the discussions:

Lesson: Residents will use social media to ask for emergency assistance

Nationally, many agencies seem to solely use social media to push information to the public rather than utilizing social media to engage and communicate with the community, especially during emergencies. Agencies often warn citizens not use social media to report emergencies. During Sandy, the New York City Fire Department tweeted: “Do not tweet emergency calls. Please call 911.” Other agencies even go so far as to block two-way communication on social media.

emily rahimi

FDNY Social Media Manager Emily Rahimi received praise for her tireless social media presence during Hurricane Sandy

In practice, when people are desperate and faced with a busy signal on 9-1-1, they turn to social media for assistance. The question is whether agencies are prepared for handling emergencies reported by social media. Are agencies listening? Are they re-directing information, providing just-in-time safety information or even life-saving information, have a process to pass along messages to dispatch or re-evaluating their policies to better handle the issue of emergency information coming through social media? As we advance towards a text- and video-capable 9-1-1 system, these issues are likely to become even more important. Many agencies need to re-evaluate their policies for handling emergency or urgent messages and might consider establishing a plan to listen and route messages through their EOC or even dispatch systems.

Lesson: Cell towers, Smartphones, and Mobile Friendly Solutions

Agencies that were quick to react on social media were able to send out their most critical messages prior to major cell towers losing power (and thus failing). Agencies must be prepared to deliver messages quickly, which may mean re-evaluating an agency’s approval process or require pre-approved messages pre-scripted in advance of a disaster. Additionally, many agencies attached links to social media messages that directed readers to basic and not mobile-friendly web pages. Mobile device-friendly webpages optimize graphics to make information clearer and easier to read; these pages can be independent mobile websites or use responsive design so that webpages scale in proportion to a user’s screen size. charging cell phones using NYPD generatorWhen power and wireless internet resources are limited, the best solution to ensure speedy delivery of messages may mean sending several messages in a row that communicate the message rather than pointing the user to a website. Additionally, when planning recovery operations, ensure proper agreements are in place to quickly mobilize Cells On Wheels and Mobile Charging Stations.

Lesson: Expect that spontaneous volunteers will show up and organize without you

As citizen groups increase social capital through online networking, agencies must engage the community in a variety of social media platforms and respond to a need they see in the community because they are listening to social media. In order to do so as a field, we may need to be more aware of how to reach and communicate with these networked groups to help everyone achieve the same goal. Independent groups can do phenomenal things and, in a major disaster, coordinating with community stakeholders will always be challenging.

Occupy_Sandy_wayfinding_sign

During Sandy, the “Occupy” movement re-branded itself as “Occupy Sandy” and put their social media muscle to work. It was through their knowledge of social media and listening to the needs of the community that they were able to coordinate their response. In fact, newspapers reported their novel use of an Amazon.com wish list to Screen-Shot-2012-11-06-at-11.44.59-AMallow purchases for needed items to be shipped and distributed by volunteers. Agencies that listen intently to the community and engage them in dialogue can motivate volunteer actions. In this way, social media can serve as a force multiplier—not only as a communications tool, but as a response and recovery apparatus.

Lesson: Pinterest and Instagram Became New Communication Tools

Communicating the severity of disasters using only words takes a talented wordsmith, but the old adage that “a picture is worth a thousand words” was quite literal during Sandy. As people sought to emotionally connect with their friends, neighbors and family members they sent photos via social media. Two social media platforms, Pinterest and Instagram, gained instant notoriety in sharing digital images. Both platforms have the ability to search for images tagged by a user, and Instagram uses the same hashtag system as Twitter, which makes images easier to find.

NHC-Pinterest

Even if your agency is not using these tools to share images, training social media staff on how to conduct searches of images can be useful for situation status updates, common operating picture, and the general condition as reported by residents of a community and survivors of a disaster.

Photo verification and rumor control

fake statue of liberty photo

Altered (fake) photo of the Statue of Liberty

While most people share photos to tell their story of the disaster, there were other nefarious individuals who used photos to create rumors. Use of photos and verification techniques was mentioned in last month’s IAEM article, however it is useful to note that reverse photo tools are available to identify misleading and patently false photos. Agencies should be prepared to verify photos and have a system in place to communicate the authenticity of a photo, or any rumor for that matter. Agencies should consider practicing the use of reverse look-up photo tools to identify the source of an image. Identify an agency policy or resource of where and how to communicate false pictures and how you may use authentic pictures as actionable intelligence. It is worth noting that social media is in fact social and the majority of users take great offense at intentional dishonesty. As such, they will often come to the aid of an agency calling out erroneous information. Do not fear incorrect information in social media, but do have a plan to report rumors and communicate accurate information quickly.

Lesson: Crisis mapping and crowdsourcing

Every disaster includes limited resources and a need to effectively distribute the resources that are available. During Sandy, fuel supply was limited and it was difficult for survivors to identify gas stations with adequate supply .  gasbuddy_508Utilizing a variety of crowd sourced methods, inducing data from apps, Google mapping, and others, workers and volunteers were able to map data of available resources and keep it updated with timely and relevant information. Agencies should consider working with information technology support and GIS partners to identify mapping solutions for the types of disaster scenarios in your agency’s plan. Free mapping tools and crowdsourcing programs, such as Google Crisis Response mapping, Ushahidi, and Creative Commons are the future of emergency management.

Conclusion

Social media plans and policies should be reviewed frequently to ensure that your agency’s intentions for using social media during disasters matches the needs of the community. There is a great deal of information on Sandy available from Lessons Learned Information Sharing (www.llis.dhs.gov), where you will find additional reports on technology used during the storm.