Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder
Place holder





Center Secure Area Sensor Management

Management of security sensors, analysis of sensor data, correlation with surveillance data and alerts from other agencies to detect potential threats, and dissemination of threat information to other agencies. Sensors may be placed in areas such as transit stops, transit stations, rest areas, park and ride lots, modal interchange facilities, on-board a transit vehicle, etc.

  1. The center shall remotely monitor and control security sensor data collected in secure areas including facilities (e.g. transit yards) and transportation infrastructure (e.g. bridges, tunnels, interchanges, roadway infrastructure, and transit railways or guideways). The types of security sensor data include environmental threat (e.g. chemical agent, toxic industrial chemical, biological, explosives, and radiological sensors), infrastructure condition and integrity, intrusion and motion, and object detection sensors. The data may be raw or pre-processed in the field.
  2. The center shall remotely monitor and control security sensor data collected in traveler secure areas, which include transit stations, transit stops, rest areas, park and ride lots, and other fixed sites along travel routes (e.g., emergency pull-off areas and travel information centers). The types of security sensor data include environmental threat (e.g. chemical agent, toxic industrial chemical, biological, explosives, and radiological sensors), intrusion and motion, and object detection sensors. The data may be raw or pre-processed in the field.
  3. The center shall remotely monitor and control security sensor data collected on-board transit vehicles. The types of security sensor data include environmental threat (e.g. chemical agent, toxic industrial chemical, biological, explosives, and radiological sensors) and object detection sensors. The data may be raw or pre-processed in the field.
  4. The center shall identify potential security threats based on collected security sensor data.
  5. The center shall perform threat analysis based on correlations of security sensor and surveillance data.
  6. The center shall exchange threat analysis data with Alerting and Advisory Systems and use that data in local threat analysis processing.
  7. The center shall disseminate threat information to other agencies, including traffic, transit, maintenance, rail operations, and other emergency management centers.