Methods and systems for assessing security risks

ABSTRACT

A user interface facilitates assessing security risks for linear corridors. The interface includes a navigation window presenting geospatial data for an area associated with a corridor. The interface also includes a navigation tool having a corridor indicator that provides a diagrammatic linear representation of the linear corridor, indicia along the corridor indicator that represent critical assets, and a corridor window superimposed on the corridor indicator that slides linearly along the corridor indicator. The portion of the corridor displayed in the interface corresponds to a location of the corridor window on the corridor indicator. The interface also includes an attributes area presenting information associated with the area presented in the navigation window. At least one of the navigation window and the attributes area is configured to present risk assessment information associated with the linear corridor.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.11/336,499, filed Jan. 20, 2006, entitled “Methods And Systems ForAssessing Security Risk,” which is herein incorporated by reference.This application also claims the benefit of U.S. Provisional ApplicationNo. 60/645,655, filed Jan. 21, 2005, entitled “Method And Systems ForEvaluating Transportation Security Risk,” which is herein incorporatedby reference.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not applicable.

TECHNICAL FIELD

Embodiments of the present invention relate to facilitating theevaluation of security risks and the risk assessment and managementassociated with linear corridors, such as transportation corridors andutility corridors, for example. More particularly, embodiments relate tomethods and systems for providing detailed geographic, demographic,environmental, and other types of information for evaluating andassessing security risks associated with critical assets along linearcorridors and facilitating the development of mitigation strategies andevent response for those security risks.

BACKGROUND

In the wake of the September 11^(th) terrorist attacks on the UnitedStates, an increased importance has been placed on ensuring security. Asa result, strides have been made by both the government and privatesectors to reduce the risk of security threats. Despite these efforts,there remain many areas with a significant exposure to potentiallydevastating terrorist attacks.

In particular, linear corridors present an area that may be exposed to asignificant threat of terrorist activities. Such linear corridors mayinclude transportation corridors, such as rail, roadway, and waterwaycorridors, as well as utility corridors, such as electric and gascorridors, for example. The nature of such linear corridors contributesto the risk of devastating terrorist activities. For example, the openinfrastructure and accessibility of many linear corridors providesignificant opportunities for attack. In addition, linear corridorsoften intersect with densely populated and urbanized areas, potentiallyincreasing the devastation of any such terrorist attack.

For example, the movement of hazardous material along freight railcorridors or roadway corridors through dense urban environments presentsa potential target for terrorist activities. Billions of tons ofhazardous materials are shipped annually by various modes oftransportation. Many of these hazardous materials include toxicinhalation hazard (TIH) chemicals. A terrorist attack of freight carscarrying TIH chemicals through a densely populated area would endangermany lives.

Accordingly, there is a need for efficient systems and methods forevaluating and assessing security risks of linear corridors by providingdetailed geographic, demographic, environmental, and other types ofinformation. Additionally, it would be beneficial if such systems andmethods further facilitated the development of mitigation and responsestrategies for identified security risks.

BRIEF SUMMARY

This summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used as an aid in determining the scope of the claimed subjectmatter.

Embodiments of the present invention relate to systems, methods, anduser interfaces for providing detailed information for assessingsecurity risks associated with linear corridors and facilitating thedevelopment of mitigation and event response strategies for thosesecurity risks. Accordingly, in one aspect, an embodiment of the presentinvention is directed to one or more computer-storage media havingcomputer-useable instructions embodied thereon for providing a userinterface facilitating the assessment of security risks for one or morelinear corridors. The interface includes a navigation window configuredto present geospatial data for an area associated with a linearcorridor. The navigation window is also configured to allow a user tonavigate the area. The interface also includes a corridor navigationtool having (A) a corridor indicator that provides a diagrammatic linearrepresentation of the linear corridor that is displayed in the userinterface, (B) indicia along the corridor indicator that representcritical assets along the linear corridor, and (C) a corridor windowsuperimposed on the corridor indicator, the corridor window configuredto slide linearly along the corridor indicator, where the portion of thelinear corridor displayed in the user interface corresponds to alocation of the corridor window on the corridor indicator, and where auser selects the portion of the linear corridor to display by moving thecorridor window along the corridor indicator. The interface alsoincludes an attributes area configured to present information associatedwith the area presented in the navigation window. At least one of thenavigation window and attributes area is configured to present riskassessment information associated with the linear corridor.

In another aspect, an embodiment is directed to one or morecomputer-storage media having computer-useable instructions embodiedthereon for performing a method of assessing security risks associatedwith a linear corridor. The method includes accessing informationassociated with the linear corridor, where the information includescombined survey data and context sensitive information associated withthe linear corridor. The linear corridor is selected from a plurality oflinear corridors. A portion of the linear corridor is displayed in firstarea of a user interface. The information associated with the linearcorridor is presented in the first area of the user interface, allowinga user to view the linear corridor in the context of the information. Acorridor navigation tool is displayed in a second area of the userinterface that is separate from the first area. The corridor navigationtool includes (A) a corridor indicator that provides a diagrammaticlinear representation of the linear corridor that is displayed in thefirst area of the user interface, (B) indicia along the corridorindicator that represent critical assets along the linear corridor, and(C) a corridor window superimposed on the corridor indicator, where thecorridor window is configured to slide linearly along the corridorindicator. The portion of the linear corridor displayed in the firstarea of the user interface corresponds to a location of the corridorwindow on the corridor indicator, and a user selects the portion of thelinear corridor to display by moving the corridor window along thecorridor indicator. The security risks associated with the linearcorridor are assessed using the combined survey data and contextsensitive information, where assessing the security risks includes (A)receiving an identification of a critical asset located along the linearcorridor, (B) accessing risk assessment metrics that include relativevalues assigned for different aspects and parameters associated withsecurity risk, (C) applying the risk assessment metrics to the criticalasset located along the linear corridor, and (D) generating a risk valuefor the critical asset. The risk value is presented to the user.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING

Illustrative embodiments of the present invention are described indetail below with reference to the attached drawing figures, wherein:

FIG. 1 is a flow diagram showing an exemplary method for assessingsecurity risks associated with linear corridors in accordance with anembodiment of the present invention;

FIG. 2 is a block diagram showing an exemplary system that may beemployed for assessing security risks associated with linear corridorsin accordance with an embodiment of the present invention;

FIGS. 3A-3I are illustrative screen displays showing user interfaces fornavigating linear corridors and assessing security risks associated withthe linear corridors in accordance with an embodiment of the presentinvention; and

FIGS. 4A-4L are illustrative screen displays showing user interfaces fornavigating linear corridors and assessing security risks associated withthe linear corridors in accordance with another embodiment of thepresent invention.

DETAILED DESCRIPTION

The subject matter of the present invention is described withspecificity herein to meet statutory requirements. However, thedescription itself is not intended to limit the scope of this patent.Rather, the inventors have contemplated that the claimed subject mattermight also be embodied in other ways, to include different steps orcombinations of steps similar to the ones described in this document, inconjunction with other present or future technologies. Moreover,although the terms “step” and/or “block” may be used herein to connotedifferent elements of the methods employed, the terms should not beinterpreted as implying any particular order among or between varioussteps herein disclosed unless and except when the order of individualsteps is explicitly described.

Embodiments of the present invention relate to assessing security risksassociated with linear corridors, such as transportation corridors andutility corridors, for example. In accordance with embodiments of thepresent invention, survey and context sensitive data may be collectedfor areas surrounding linear corridors. The linear corridors may beidentified within the various data, and critical assets may beidentified along each linear corridor. Users may access the data (e.g.,via a computerized risk assessment system) to asses security risksassociated with the critical assets and linear corridors. Mitigation andresponse strategies may also be developed using the detailed survey andcontext sensitive data.

Accordingly, embodiments of the present invention provide, among otherthings, a tool for multifunctional security analysis for linearcorridors including risk assessment and planning, mitigation andpreparedness, response, and recovery. Embodiments provide detailedgeographic, demographic, environmental and other types of informationand dedicated tools to facilitate the analysis of security risksassociated with linear corridors and the development of mitigationstrategies. In addition, embodiments of the present invention facilitatethe distribution of information regarding mitigation and responsestrategies by providing for the communication of such information toemergency response personnel via emergency responder networks, forexample.

A variety of benefits may be realized via embodiments of the presentinvention, including, but not limited to: consistent, organized, andaccessible information for security risk evaluation and assessment; costeffective use of skilled resources; factual presentation of information;ability to view linear corridor assets and their adjacent communities;minimal disruption to corridor service; enhanced safety for personnel(by minimizing on-the-ground interaction with linear corridoroperations); scaleable to meet multiple security planning purposes andlocations; and ability to tie into emergency responder networks, such asthe Operation Respond emergency responder network.

Some embodiments of the present invention may be implemented at least inpart in a variety of computing system environments. For example,embodiments may be implemented in an application program running on oneor more personal computers (PCs). This computing system environment isonly one example of a suitable computing environment and is not intendedto suggest any limitation as to the scope of use or functionality of theinvention. Embodiments of the invention may also be implemented withnumerous other general purpose or special purpose computing systemenvironments or configurations. Examples of other well-known computingsystems, environments, and/or configurations that may be suitable foruse with the invention include, but are not limited to, servercomputers, hand-held or laptop devices, multiprocessor systems,microprocessor-based systems, programmable consumer electronics, networkPCs, minicomputers, mainframe computers, distributed computingenvironments that include any of the above systems or devices, and thelike.

Embodiments of the invention may be described in the general context ofcomputer-executable instructions, such as program modules. Generally,program modules include routines, programs, objects, components,segments, schemas, data structures, etc. that perform particular tasksor implement particular abstract data types. Embodiments of theinvention may also be practiced in distributed computing environmentswhere tasks are performed by remote processing devices that are linkedthrough a communications network. In a distributed computingenvironment, program modules may be located in both local and remotecomputer storage media including memory storage devices.

Computers typically include a variety of computer-readable media.Computer-readable media includes any media that can be accessed by acomputer and includes both volatile and nonvolatile media, removable andnon-removable media. By way of example, and not limitation,computer-readable media may comprise computer storage media andcommunications media. Computer storage media include both volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information such as computer-readableinstructions, data structures, program modules or other data. Computerstorage media includes, but is not limited to, RAM, ROM, EEPROM, flashmemory or other memory technology, CD-ROM, digital versatile disks(DVD), holographic or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by a computer.

Communications media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communications media includes wired media such as awired network or direct wired connection, and wireless media such asacoustic, RF, infrared, spread spectrum and other wireless media.Communications media are commonly used to upload and downloadinformation in a network environment, such as the Internet. Combinationsof any of the above should also be included within the scope ofcomputer-readable media.

The computer may operate in a networked environment using logicalconnections to one or more remote computers, such as a personalcomputer, a server, a router, a network PC, a peer device or othercommon network node, and typically includes many or all of the elementsdescribed above. The logical connections may include connections to alocal area network (LAN), a wide area network (WAN) and/or othernetworks. Such networking environments are commonplace in offices,enterprise-wide computer networks, intranets and the Internet.

Computer storage mechanisms and associated media provide storage ofcomputer-readable instructions, data structures, program modules andother data for the computer. A user may enter commands and informationinto the computer through input devices such as a keyboard and pointingdevice, commonly referred to as a mouse, trackball or touch pad. Otherinput devices may include a microphone, touchscreen, camera, joystick,game pad, scanner, or the like. In addition to a monitor or other typeof display device, computers may also include other peripheral outputdevices such as speakers and printers, which may be connected through anoutput peripheral interface.

Although many other internal components of computers have not beendiscussed herein, those of ordinary skill in the art will appreciatethat such components and their interconnection are well-known.Accordingly, additional details concerning the internal construction ofcomputers need not be disclosed in connection with the presentinvention.

Turning now to FIG. 1, a flow diagram is provided illustrating anexemplary method 100 for assessing security risks associated with linearcorridors in accordance with an embodiment of the present invention.Initially, as shown at block 102, a site is selected for evaluation.Generally, the site may comprise an area of any size. By way of exampleonly and not limitation, in some embodiments, the site may be amunicipality, such as a city, which may include a number of linearcorridors. In some embodiments, the site may comprise a single linearcorridor or simply a portion of a single linear corridor. Any and allsuch variations are contemplated to be within the scope of the presentinvention.

As shown at block 104, survey data regarding the site is collected bysurveying the site. In some embodiments of the present invention,collection of survey data may also include obtaining video and stillimages of portions of the site. Any of a variety of survey methods maybe employed within the scope of the present invention. However, in someembodiments, non-intrusive and/or non-contact survey methods may beemployed. The collection of data in such a manner allows a significantamount of survey data to be collected in an accurate, safe, and rapidmanner, while not disrupting operations of linear corridors. Forexample, three dimensional survey data may be collected from an aircraftusing light detection and ranging (LiDAR) technology. Additionally, anaircraft may be equipped with front- and downward-facing video and stillcameras to obtain video and still images of portions of the site. Avariety of other non-intrusive technologies, such as ground penetratingradar (GPR), Sonar, and remote sensing applications, may also beemployed within the scope of the present invention.

Context sensitive information regarding the site is also collected, asshown at block 106. The information collected may include demographic,transportation, environmental, and linear corridor information, as wellas a variety of other types of context sensitive information. Suchinformation may be collected from any of a variety of different sourceswithin the scope of the present invention. For example, such informationmay be collected from existing public and commercially available GISdata resources. In some embodiments, the information may includereal-time data, such as current weather information, which may assist inassessing not only security risks but also identifying mitigation andresponse strategies for actual events. For example, real-time wind speedand direction information may be useful in determining the areas thatmay be impacted by a release of TIH chemicals.

As shown at block 108, linear corridors are identified within the surveydata and the context sensitive information collected at blocks 104 and106. As discussed previously, such linear corridors may include, forexample, transportation corridors, such as roadway, rail, and waterwaycorridors. Additionally, such linear corridors may include utilitycorridors, such as water, electric, and gas corridors, for example.

Critical assets along each linear corridor are also identified, as shownat block 110. Generally, an asset may be any element or feature of alinear corridor. For example, with respect to a rail corridor, assetsmay include such elements as bridges, grade crossings, mainlineturnouts, mainline diamonds, mainline signals, track segments, and yardsites. Each corridor may include a wide variety of different assets.However, many of the assets may be irrelevant for risk assessmentpurposes. For example, assets associated with a linear corridor mayinclude such features as buildings, curb lines, and fences that arecommon and alone would be little use to a terrorist in causing a largescale incident. Accordingly, the assets that are most likely to be usedin terrorist activities and are most relevant for risk assessmentpurposes are identified as critical assets.

Survey and context sensitive data are next associated with eachidentified critical asset and attributes are defined for each criticalasset, as shown at block 112. By associating the data and defining assetattributes, the context for effective risk assessment anddecision-making may be provided. A wide variety of data and attributesmay be associated with each critical asset. By way of example only andnot limitation, Table 1 below presents exemplary data elements and assetattributes that may be associated with a variety of rail assets. Itshould be noted that the assets and associated data and attributes shownin Table 1 are provided for illustrative purposes only and should in noway be considered limiting. A variety of additional assets may beconsidered critical assets for rail corridors. In addition, a variety ofadditional data and attributes may be associated with each criticalasset listed in Table 1.

TABLE 1 Exemplary Data and Attributes for Rail Assets Asset Asset Dataand Attributes Railroad Bridge Bridge identification, railroad owner,subdivision, milepost, material, type of construction, type offoundation, span lengths and number of spans, crossing feature type,crossing feature name, crossing feature owner, roadway ADT, number offreight trains per day, number of passenger trains per day, use byhazardous material cars, track speed, track class, population within ahalf-mile radius, predominant land use within a half- mile radius,county, township Roadway Bridge Bridge identification, railroad owner,subdivision, milepost, material, type of construction, type offoundation, span lengths and number of spans, crossing feature type,crossing feature name, crossing feature owner, roadway ADT, number offreight trains per day, number of passenger trains per day, use byhazardous material cars, track speed, track class, population within ahalf-mile radius, predominant land use within a half- mile radius,county, township Grade Crossing FRA crossing identification, railroadowner, crossing warning system type, number of tracks, crossing roadwayname, crossing roadway owner, number of roadway lanes, roadway ADT, typeof crossing surface construction, number of freight trains per day,number of passenger trains per day, use by hazardous material cars,track speed, track class, population within a half- mile radius,predominant land user within a half-mile radius, county, townshipMainline Turnout Interlocking identification, railroad owner,subdivision, milepost, turnout frog number, number of freight trains perday, number of passenger trains per day, use by hazardous material cars,track speed, track class, population within a half-mile radius,predominant land use within a half-mile radius, county, township DiamondCrossing Interlocking identification, railroad owner, subdivision,milepost, turnout frog number, number of freight trains per day, numberof passenger trains per day, use by hazardous material cars, trackspeed, track class, population within a half-mile radius, predominantland use within a half-mile radius, county, township Signal Interlockingidentification, aspects, type of signal, type of control, railroadowner, subdivision, milepost, number of freight trains per day, numberof passenger trains per day, use by hazardous material cars, trackspeed, track class, population within a half-mile radius, predominantland use within a half- mile radius, county, township

Having collected detailed survey and context sensitive information andassociated the information with critical assets, security risksassociated with the linear corridors within the site may be assessed, asshown at block 114. Generally, a system (such as that described infurther detail below) may be provided to allow users to access thedetailed survey and context sensitive information and assess securityrisks associated with linear corridors. The system may provide a numberof user interfaces (such as those also described in further detailbelow) for accessing the data and assessing security risks. The userinterfaces may include context sensitive mapping allowing users to viewlinear corridors and critical assets in the context of the survey dataand context sensitive information collected for the site.

In various embodiments of the present invention, security risks may beevaluated and assessed at a variety of different levels. For example, insome embodiments, security risks may be assessed for each criticalasset. Additionally or alternatively, in some embodiments, securityrisks for a portion of a linear corridor or an entire linear corridormay be assessed. In some cases, this may comprise assessing risk at eachpoint along the linear corridor. In other cases, this may entailaggregating security risks associated with the critical assets withinthe portion of the linear corridor under review. In further embodimentsof the present invention, security risks may be accessed for a selectedarea having multiple linear corridors within the site.

The assessment of security risks associated with linear corridors mayemploy a subjective and/or objective approach within various embodimentsof the present invention. Under a subjective approach to riskassessment, a user may access the detailed survey and context sensitiveinformation, viewing linear corridors and critical assets in the contextof such information. After reviewing the information, the user may makea subjective determination of security risks associated with linearcorridors and critical assets. As will be discussed in further detailbelow, a system may be provided allowing the user to enter and recordsuch subjective determinations.

In some embodiments, an objective approach to risk assessment may beemployed. For example, risk assessment metrics may be defined within thesystem to allow for the objective quantification of risk associated withlinear corridors under review based on the detailed survey and contextsensitive information. The risk assessment metrics may consist ofrelative values assigned for different aspects and parameters associatedwith security risk. For instance, different values may be assigned basedon the population density within a particular radius around a criticalasset. As another example, values may be assigned based on theaccessibility of a critical asset (e.g., whether the area is fenced, hassecurity cameras, etc.). As a further example, values may be assignedbased on aspects of a critical asset, such as the structural integrityof a bridge, for example. Accordingly, risk assessment metrics may bedefined for a wide variety of parameters within the scope of the presentinvention, thereby allowing for an objective quantification of securityrisk associated with critical assets and linear corridors.

It should be noted that the assessment of security risks within block114 may include various activities within the scope of the presentinvention and is not necessarily limited to merely risk assessment. Forexample, the activities may include development of mitigationstrategies, planning and preparedness, response strategies, and recoverystrategies. For instance, by evaluating detailed survey data and contextsensitive information associated with a particular critical asset, auser may determine that particular infrastructure improvements would beappropriate. As another example, the assessment of risks associated withlinear corridors may facilitate the routing of hazardous materials toreduce the use of corridors identified as having the highest risk,thereby reducing the threat of a devastating terrorist attack.

With reference to FIG. 2, a block diagram is provided illustrating anexemplary risk assessment system 200 that may be employed for assessingsecurity risks associated with linear corridors in accordance with anembodiment of the present invention. The risk assessment system may becentrally located and accessible to multiple users using customized userinterfaces and security logins. Accordingly, the risk assessment systemmay provide for the distribution of consistent data to multiple userswhile allowing for custom dedicated tools by user needs. As shown inFIG. 2, the risk assessment system 200 may generally comprise adatasource 202, a workbench 204, and an application platform 206. Itshould be understood that the risk assessment system 200 shown in FIG. 2is provided for illustrative purposes only and is not intended to limitthe scope of the present invention.

The datasource 202 is configured to store the various pieces of dataused by the risk assessment system 200 and may comprise a number of datacomponents. For example, the datasource 202 may include a securitysettings component 208, which includes user information, such asusernames and passwords that may be associated with user profiles. Theuser profiles define each user's access to the system and the variousdata pieces. In addition, the user profiles may define each user'sability to enter and modify data. The datasource 202 may also include arisk database 210, which stores data associated with the determinationof security risks for linear corridors. For example, the risk database210 may store values used as inputs in the objective calculation ofsecurity risks associated with linear corridors. In turn, risk valuesthat are determined by an objective risk calculation may also be storedin the risk database 210. The risk database 210 may further storesubjective comments and other information entered by users.

The datasource 202 may also include an imagery component 212 for storingimagery data. Such data may include any digital imagery gathered for thearea being evaluated. For example, the data may include base maps,aerial photos, videos, and still images that have been collected. Thedatasource 202 may further include a context sensitive data component214, which may store any type of context sensitive information that hasbeen collected for the area being evaluated, such as demographicinformation, environmental information, corridor asset information, andthe like. The context sensitive data may include, for example,information gathered from GIS databases. The datasource 202 may furtherinclude a live data component 216, which may be configured to store orprovide access to real-time data 216, such as current weatherconditions, for example.

The workbench 204 operates as the center of processing for the riskassessment system and may include a number of components, such as asecurity manager 218, a data manager 220, a risk calculator 222, and atool wrapper 224. The security manager 218 coordinates user access tothe system based on user information stored in the security settingscomponent 208 of the datasource 202. In addition, the security manager218 allows administrators to define and modify those security settings.The workbench also includes a data manager 220, which operates to pushand pull data to and from the datasource 202. The data manager 220 maycommunicate with other components of the workbench and applicationplatform to coordinate access to appropriate data pieces stored by thedatasource 202, as well as receiving data from these other componentsand communicating the data to the datasource 202 for storage.

In embodiments in which objective risk assessment may be performed, theworkbench may also include a risk calculator 222 for performingobjective risk assessment calculations. The data manager 220 and riskcalculator 222 may communicate to access the appropriate data pieces forthe calculation of risk values for linear corridors. Further, in someembodiments, a tool wrapper component 224 may be provided to allow forthe addition of third party modules that would be interfaced with theworkbench 204, thereby providing additional risk assessment features.Third party modules may handle data pieces differently than the riskassessment system 200. Accordingly, the tool wrapper component 224 mayprovide for the transformation of data between formats appropriate forthe risk assessment system 200 and a third party module interfaced withthe system.

The risk assessment system 200 further includes an application platform206, which facilitates user interaction with the risk assessment system200 via a variety of user interfaces. For example, the applicationplatform 206 may include a security administrator component 226, whichprovides for user access to the system via a secure login process. Inaddition, the security administrator 226 provides user interfacesallowing administrators to manage the security settings for varioususers. The application platform 206 also includes a risk assessment tool228, which provides for the primary user interaction with riskassessment information stored by the datasource 202. The risk assessmenttool 228 may provide various user interfaces allowing users to viewvarious aspects of linear corridors under review, including geospatialdata, context sensitive information, video imaging, and the like. Inaddition, the risk assessment tool 228 facilitates the subjective and/orobjective assessment of security risks associated with linear corridors.The application platform 206 may further include a scenario builder 230,which may allow users to generate hypothetical threat scenarios anddetermine risks associated with those scenarios. A variety of additionaltools not shown in FIG. 2 may be further provided via the applicationplatform 206 within the scope of the present invention.

As indicated previously, embodiments of the present invention provideuser interfaces for navigating the detailed information associated withlinear corridors and assessing security risks associated with eachcorridor. Referring first to FIGS. 3A through FIG. 3I, a series ofscreen displays are provided illustrating user interfaces for navigatinglinear corridors and assessing security risks associated with thosecorridors in accordance with an embodiment of the present invention. Itwill be understood and appreciated by those of ordinary skill in the artthat the screen displays of FIGS. 3A through 3I are provided by way ofexample only and are not intended to limit the scope of the presentinvention in any way.

Initially, a user may access the system and view a general area ofinterest. For example, as shown in FIG. 3A, a user has accessed thesystem and is viewing a map of Chicago. Typically, accessing the systemwill comprise a secure login process, such as a user being required toprovide a valid username and password. As shown in FIG. 3A, the userinterface includes a navigation window 302 for viewing and navigatingthe area under review. The navigation window provides a variety ofgeospatial data for an area navigated to by a user. The user interfacefurther includes an attributes area 304, allowing a user to furtheraccess a variety of information associated with the area under review,as well as input data into the system.

A variety of search methods may be used for navigating linear corridorswithin the scope of the present invention. By way of example only andnot limitation, such search methods may include map driven searches,corridor and milepost searches, street address searches, andlatitude/longitude coordinate searches. For example, in someembodiments, a search may be map driven by a user interacting with thenavigation window 302. A tool bar 306 is located adjacent the navigationwindow 302 and provides a number of tools for navigating to particularportions of the area under review. For instance, a user may employ toolsto zoom in and out of the area. In some cases, a user may graphicallyselect a particular corridor. The user interface also includes a searchtool 308, allowing a user to enter search criteria for quicklynavigating to a particular area of interest.

As shown in FIG. 3B, as a user zooms into a particular area of interest,a variety of contextual information may be viewed in the navigationwindow 302. A “Layers” tab is provided in the attributes area 304,allowing a user to control the contextual information that is presentedin the navigation window 302. By employing the “Layers” tab, a user mayselect the particular layers of contextual information that the userwishes to view. A wide variety of layers of contextual information maybe selectively turned on and off. Such information may include, forexample, demographic information, transportation information,environmental information, and corridor asset information. Byselectively viewing particular layers, a user may view appropriatecontextual information in conjunction with linear corridors. Forexample, in some cases, a user may be primarily interested in populationdensity along a particular corridor and may select to view only thatlayer while removing other layers. In other cases, a user may beprimarily interested in environmental considerations associated with acorridor and may view that layer while removing other layers. In someembodiments, system-defined and/or user-defined shortcuts may beprovided to quickly activate appropriate data layers and map scales.

An aerial photograph button 310 is also provided within the layers tab308. By selecting the aerial photograph button 310, an aerial photographmay be overlaid onto the navigation window 302, as shown in FIG. 3C.Accordingly, a user may view additional contextual information via theaerial photograph.

As a user navigates through an area, the user may recognize and wish toevaluate critical assets associated with linear corridors. For example,a user may recognize the bridge 312 in the navigation window 302 of FIG.3C as a critical asset and may select the bridge 312 for furtherevaluation. After selecting the bridge 312, detailed informationregarding the critical asset may be viewed, as initially shown in FIG.3D. Details of the critical asset are shown in the navigation window302, allowing the user to consider such issues as drainage,accessibility, general topography, and other features. In addition, an“Asset” tab of the attributes area 304 provides overview informationregarding the selected critical asset, including information such asbridge number, milepost location, structure type, and other relatedasset information.

The “Asset” tab further includes a number of buttons 314, 316, 318, and320, allowing a user to access further information regarding thecritical asset. For example, by selecting the assessment data button316, the user may view additional data associated with the criticalasset for the purposes of risk assessment. As shown in FIG. 3E, a datawindow 322 is presented providing assessment data. The assessment datamay include population data, such as a report of resident and employeepopulations within a quarter-mile, half-mile, and one-mile radius aroundthe asset. The assessment data may also include environmental data, suchas water features within a quarter-mile, half-mile, and one-mile radiusaround the asset. The assessment data may further include transportationdata, such as the number and identity of road/rail crossings within aquarter-mile, half-mile, and one-mile radius around the asset.

A user may also wish to view video and still images associated with thecritical asset to observe details of the asset for evaluation purposes.Accordingly, by selecting the video flyover button 318, a user may viewvideo associated with the critical asset, as shown in the video window324 in FIG. 3F. Additionally, the user may view different resolutionstill images in an image window 326, such as that shown in FIG. 3G. Theimages may include both forward-looking and downward-looking stillimages.

A user may further examine an interactive view by selecting theinteractive view button 320. As shown in FIG. 3H, by selecting theinteractive view button 320, a user may access a three-dimensionalvisualization of the critical asset, which is provided in the navigationwindow 302. The three-dimensional visualization allows the user to viewfeatures of the critical asset and surrounding area from differentperspectives, further facilitating the risk assessment process.

Having reviewed various details and information associated with thecritical asset, a user may develop and record assessment information,mitigation strategies, and response strategies by selecting theassessment input button 314. As shown in FIG. 3I, input areas 328, 330,and 332 are provided in the attributes area 304, thereby allowing a userto enter and save details of his/her assessment of the critical asset.Accordingly, the present embodiment illustrates a subjective approach torisk assessment. For example, the user may note potential risks relatedto the surrounding area, such as risks to nearby residentialpopulations. In addition, users can develop mitigation strategies, suchas approaches to harden the critical asset or reduce the accessibilityof the asset, making it less susceptible to a terrorist attack. Thedetailed data, maps, and views of the critical asset provide necessaryinformation upon which to define mitigation elements and strategies.

In some cases, the current user or another user may have previouslyentered comments regarding the asset. In some embodiments, the user maybe able to view and modify the previous entered comments via the inputareas 328, 330, and 332. Additionally, selected assessment data may belinked to emergency response networks, such as Operation Respond, toallow for the effective communication of assessment data, mitigationstrategies, and response strategies to first response personnel,freight/commuter train operators, freight truck operators, and the like.Accordingly, the response planning process may employ the system tominimize danger to adjacent populations through rapid response. Forexample, simple train born location equipment employing a GPS receiverand radio frequency transmitter can identify the location and identityof a train that may have been the subject of an attack. A responsecoordinator or dispatch office may then access detailed informationprovided via embodiments of the present invention, including detailedmaps, photos, and pre-established contingency plans and responsestrategies to implement appropriate emergency measures.

Referring now to FIG. 4A through FIG. 4I, a series of screen displaysare provided illustrating user interfaces for assessing security risksassociated with linear corridors in accordance with another embodimentof the present invention. It will be understood and appreciated by thoseof ordinary skill in the art that the screen displays of FIGS. 4Athrough 4I are provided by way of example only and are not intended tolimit the scope of the present invention in any way.

Initially, a user may access the system, as shown in FIG. 4A, via aninitial user interface allowing the user to login and view generalsystem information. The user interface may include a system status area402, in which the user may enter a username and password to login. Thesystem status area 402 may also include a variety of status information,such as user privileges, login time, session length, last login, andnetwork status. A system updates area 404 may also be provided, allowinga user to view information regarding system downloads, builds, andpatches that may be available, as well as recent data updates.Additionally, a user project area 406 may be provided to present summaryinformation regarding projects associated with the current user.Further, the user interface may include a process navigation bar 408,which may indicate the user's current position in the assessmentprocess. For example, as shown in FIG. 4A, the user is currently on the“Start” tab. The user may employ the process navigation bar 408 tonavigate through the security risk assessment process.

After logging into the system, the user may begin the assessmentprocess. As shown in FIG. 4B, the user has accessed the system and isviewing rail corridors for Chicago. Although only rail corridors areshown in FIG. 4B, it should be understood that the present invention isequally applicable to other types of corridors and is not limited torail corridors, which are provided herein for illustrative purposesonly. A navigation window 410 is provided in the user interface,allowing the user to view a particular area of interest. Geospatial dataregarding an area being reviewed may be provided via the navigationwindow 410.

The user interface may also include an attributes area 414 forpresenting information associated with linear corridors, criticalassets, and the risk assessment process. For example, in FIG. 4B, when auser first selects a linear corridor for review, an asset summary may beprovided in the attributes area 414. The attributes area 414 may furtherallow users to enter and modify information as will be described infurther detail below.

Although a number of tools provided in a tool bar 412 may allow a userto interactively navigate the geospatial data provided in the navigationwindow 410 (e.g., to zoom in and out of the data), the presentembodiments includes a corridor navigation tool 416, which provides aprimary navigation mechanism. The corridor navigation tool 416 allows auser to selectively control the image (i.e., the portion of the linearcorridor and surrounding area) displayed in the navigation window 410.Referring now to FIG. 4C, further details of the corridor navigationtool 416 will be described. The corridor navigation tool 416 includes acorridor indicator 418, which provides a linear representation of aselected corridor. Critical assets located along a selected corridor mayalso be represented in the corridor navigation tool 416 using a varietyof indicia, such as that shown for critical asset 420. In variousembodiments of the present invention, different indicia (e.g., varyingcolors and shapes) may be provided to represent information associatedwith each critical asset, such as, for instance, the type of a criticalasset or the risk identified for a critical asset. In some embodiments,when a user places a cursor over a critical asset, information, such asan asset identification number, for instance, may be presented (e.g.,via a pop-up dialog window).

A user may interactively control the portion of a selected linearcorridor (and surrounding area) presented in the navigation window 410by employing a corridor window 422 provided in the corridor navigationtool 416. A user may move the corridor window 422 along the corridorindicator 418 (e.g., by clicking on the corridor window 422 and slidingthe corridor window 422 along the corridor indicator 418), therebyselecting the portion of the corridor to display in the navigationwindow 410. A user may also control the extent of the corridor displayedin the navigation window 410 by changing the size of the corridor window422 (e.g., by clicking on an end of the corridor window 422 and movingthe end left or right to resize the window 422).

The corridor navigation tool 416 may further include a corridornavigation menu 424, which a user may employ to control various aspectsof the corridor navigation tool 416. For example, a user may select thecorridor to navigate. In addition, the user may select a particularasset within the selected corridor to which to navigate directly. Thecorridor navigation menu 424 may also allow the user to filter the assettypes shown in the corridor navigation tool 416 and manually enter amilepost range for the corridor window 422. A user may be able tofurther access and control asset status information, such as graphicalsettings for the critical assets shown in the corridor navigation tool416.

Although the corridor indicator 418 shown in FIG. 4C merely provides acenterline representation of a linear corridor, further embodiments mayaccount for the fact that some linear corridors may be more complex,such as rail corridors having multiple tracks, turnouts, and the like.Such further embodiments may include corridor indicators providingfurther detail (e.g., show multiple tracks). For example, an alternativecorridor navigation tool 426 is illustrated in FIG. 4D. As shown in FIG.4D, various tracks, turnouts, and the like for a single corridor areprovided in the corridor navigation tool. Additional, the approximatelocation of assets within the corridor may be better represented. Thecorridor navigation tool 426 further includes buttons 428 allow a userto zoom in and out.

As a user navigates a linear corridor, the user may access variousinformation associated with the corridor. For example, referring to FIG.4E, the user is currently on the “Criticality” tab in the processnavigation bar 408 and is provided asset information via the attributesarea 414. Initially, as shown in FIG. 4E, the user is provided anindication of a currently selected critical asset. In addition, a listof critical assets for the selected corridor is indicated, providingsummary information, including asset id, type, and priority (i.e., anindication of risk associated with the asset). The attributes area 414further provides the ability for users to add new assets by providinginformation, such as type of asset and location, and selecting the “Add”button 430.

As shown in FIG. 4F, the user may further access detailed informationassociated with a current critical asset. In some cases, the user mayenter and/or adjust values within the data and select an update button432 to update the data in the system. Using tools provided in the toolbar 412, the user may also access video and still images associated withthe current critical asset to view particular details of the asset.

Referring now to FIG. 4G, having reviewed images and data associatedwith a critical asset, a user may perform a threat assessment for theasset. For example, the assessment may allow the user to provideinformation as to the accessibility, criticality, desirability, andrecognizability of the critical asset. In some cases, such informationmay be system-determined and presented to the user, who may manuallyoverride the system determination. After entering such information ormaking any modifications, the user may select an update button 434 toupdate the data in the system.

The user may also perform a vulnerability assessment for the currentcritical asset, as shown in FIG. 4H. The user may identify variousissues associated with the asset and enter subjective comments regardingeach issue. The user may also identify issue types and categories (e.g.,level of concern for each issue) via drop-down menus and may indicateany countermeasures currently in place. Such information may then beused in objective risk determinations.

The results of an objective risk assessment for a linear corridor may berepresented in a number of ways within various embodiments of thepresent invention. Referring initially to FIG. 4I, a user interface isillustrated showing the user navigating to the “Risk” tab of the processnavigation bar 408. The user interface provides an asset risk summary436 for a current asset. The summary shown in FIG. 4I provides top-levelsummary of various categories associated with risk assessment for thecurrent asset, include desirability, criticality, accessibility,recognizability, and intangible effects. An objective risk assessmentvalue that has been calculated is provided for each. In some cases, auser may decide to override a value, and input a different value. Insuch cases an indication may be provided, such as the indication 438 forcriticality, indicating that a user has either raised or lowered avalue. In some cases, each of the components shown in the asset risksummary may include indicia, such as color-coding, to provide a quickindication as to a relative level of risk.

Another user interface showing summary risk information is shown in FIG.4J. The user interface includes a corridor risk chart 440, whichprovides a graphical representation of the relative level of riskdetermined along the selected linear corridor. The user interface alsoprovides an asset risk summary 442 providing more detailed informationfor a current asset. The asset risk summary 442 provides an indicationof an objective risk value that has been determined for the currentasset. In addition, the asset risk summary 442 provides a variety ofrisk factor information associated with the determination of theobjective risk value, such as vulnerability, importance, populationwithin a predetermined radius, and proximity to entities, such as ahospital and police station. The attributes area 414 allows the user tofilter the risk factors included in the asset risk summary 442. Inaddition, the attributes area 414 may provide a log indicating when riskcalculations were performed.

A further user interface showing risk determined for assets along alinear corridor is shown in FIG. 4K. The user interface includes a assetrisk summary area 444, that provides a representation of the corridorunder review. As such, a use may view details of the corridor (e.g.,number of tracks) in conjunction with risk determined for various assetswithin a window. In addition, detailed risk information may be providedfor a currently selected asset.

Finally, referring to FIG. 4L, a user may navigate to the “Needs” tab ofthe process navigation bar 408. Having reviewed the various informationand risk calculations that have been performed, the user may entercomments regarding a linear corridor, a specific critical asset, or setof critical assets. For example, the user may enter comments regardingmitigation strategies, response strategies, and recovery strategies.These comments may then be made to other users, for example, toimplement improvements to harden a critical asset or access response andrecovery strategies in the event of an attack.

As can be understood, embodiments of the present invention providemethods, systems, and user interfaces facilitating the assessment ofsecurity risks associated with linear corridors. The present inventionhas been described in relation to particular embodiments, which areintended in all respects to be illustrative rather than restrictive.Alternative embodiments will become apparent to those of ordinary skillin the art to which the present invention pertains without departingfrom its scope.

From the foregoing, it will be seen that this invention is one welladapted to attain all the ends and objects set forth above, togetherwith other advantages which are obvious and inherent to the system andmethod. It will be understood that certain features and subcombinationsare of utility and may be employed without reference to other featuresand subcombinations. This is contemplated and within the scope of theclaims.

What is claimed is:
 1. One or more nontransitory computer-storage mediahaving computer-useable instructions embodied thereon for providing auser interface facilitating the assessment of security risks for one ormore linear corridors, the user interface comprising: a navigationwindow configured to display geospatial data for a geographical areathat includes a plurality of linear corridors, wherein the linearcorridors include transportation corridors and/or utility corridors,wherein the navigation window displays one or more portions of theplurality of linear corridors, and wherein the navigation window isfurther configured to allow a user to navigate the geographical area; agraphic interface configured to receive a selection of a linear corridorfrom the plurality of linear corridors in the geographical area, whereinin response to the selection of the linear corridor from the pluralityof linear corridors in the geographical area, a corridor indicatorprovides a diagrammatic linear representation of the selected linearcorridor in a corridor navigation tool; the corridor navigation toolthat includes (A) the corridor indicator that provides the diagrammaticlinear representation of the selected linear corridor that is displayedin the navigation window, (B) indicia along the corridor indicatorwhich, in response to the selection of the linear corridor, representcritical assets along the selected linear corridor, and (C) a corridorwindow superimposed on the corridor indicator, wherein the corridorwindow is configured to slide linearly along the corridor indicator,wherein the corridor window corresponds to the geographical areadisplayed in the navigation window, wherein the corridor window isanchored to the selected linear corridor such that, as the corridorwindow slides linearly along the corridor indicator, the navigationwindow follows the selected linear corridor such that the portion of theselected linear corridor displayed in the user interface corresponds toa location of the corridor window on the corridor indicator, and whereina user selects the portion of the selected linear corridor to display bymoving the corridor window along the corridor indicator; an attributesarea configured to present information associated with the areapresented in the navigation window; and wherein at least one of thenavigation window and attributes area is further configured to presentrisk assessment information associated with the selected linearcorridor.
 2. The one or more nontransitory computer-storage media ofclaim 1, wherein the attributes area is configurable to filter riskfactors included in an asset risk summary.
 3. The one or morenontransitory computer-storage media of claim 2, wherein the attributesarea is configurable to filter risk factors included in the asset risksummary, wherein the risk factors include one or more of vulnerability,importance, population within a predetermined radius, or proximity to anentity.
 4. The one or more nontransitory computer-storage media of claim1, wherein the attributes area provides a log indicating when riskcalculations were performed.
 5. The one or more nontransitorycomputer-storage media of claim 1, wherein the navigation windowincludes a search tool utilizing search criteria to navigate to aparticular area.
 6. The one or more nontransitory computer-storage mediaof claim 5, wherein the search criteria include one or more of acorridor, a milepost, a street address, or latitude and longitudecoordinates.
 7. One or more nontransitory computer-storage media havingcomputer-useable instructions embodied thereon for performing a methodof assessing security risks associated with a selected linear corridor,the method comprising: accessing information associated with ageographical area that includes the selected linear corridor, whereinthe selected linear corridor comprises a transportation corridor or autility corridor, wherein the information comprises combined survey dataand context sensitive information associated with the selected linearcorridor, and wherein the selected linear corridor is selected from aplurality of linear corridors within the geographical area; displaying aportion of the selected linear corridor within a portion of thegeographical area in a first area of a user interface; presenting theinformation associated with the selected linear corridor in the firstarea of the user interface, thereby allowing a user to view the selectedlinear corridor in the context of the information; displaying a corridornavigation tool in a second area of the user interface that is separatefrom the first area, wherein the corridor navigation tool includes A) acorridor indicator which, in response to the selection of the selectedlinear corridor, provides a diagrammatic linear representation of theselected linear corridor that is displayed in the first area of the userinterface, B) indicia along the corridor indicator which, in response tothe selection of the selected linear corridor, represent critical assetsalong the selected linear corridor, and C) a corridor windowsuperimposed on the corridor indicator, wherein the corridor window isconfigured to slide linearly along the corridor indicator, and whereinthe corridor window corresponds to the portion of the geographical areadisplayed in the first area of the user interface, wherein the corridorwindow is anchored to the selected linear corridor such that, as thecorridor window slides linearly along the corridor indicator, the firstarea of the user interface follows the selected linear corridor suchthat the portion of the selected linear corridor displayed in the firstarea of the user interface corresponds to a location of the corridorwindow on the corridor indicator, and wherein a user selects the portionof the selected linear corridor to display by moving the corridor windowalong the corridor indicator; assessing the security risks associatedwith the selected linear corridor using the combined survey data andcontext sensitive information, wherein assessing the security risksincludes A) receiving an identification of a critical asset locatedalong the selected linear corridor, B) accessing risk assessmentmetrics, wherein the risk assessment metrics include relative valuesassigned for different aspects and parameters associated with securityrisk, C) applying the risk assessment metrics to the critical assetlocated along the selected linear corridor, and D) generating a riskvalue for the critical asset; and presenting the risk value to the user.8. The one or more nontransitory computer-storage media of claim 7,wherein the information associated with the selected linear corridorfurther comprises real-time data.
 9. The one or more nontransitorycomputer-storage media of claim 7, wherein the information associatedwith the selected linear corridor further comprises digital images ofselected portions of the selected linear corridor.
 10. The one or morenontransitory computer-storage media of claim 7, wherein the survey datacomprises data collected from an aircraft using light detection andranging (LiDAR) technology.
 11. The one or more nontransitorycomputer-storage media of claim 7, wherein the context sensitiveinformation includes information selected from a group comprising:demographic information, transportation information, environmentalinformation and corridor asset information.
 12. The one or morenontransitory computer-storage media of claim 7, wherein assessing thesecurity risks associated with the selected linear corridor comprises:receiving user-provided risk assessment information; and storing theuser-provided risk assessment information.
 13. The one or morenontransitory computer-storage media of claim 7, wherein assessing thesecurity risks associated with the selected linear corridor comprisesperforming an objective risk assessment of the selected linear corridor.14. The one or more nontransitory computer-storage media of claim 7,further comprising developing at least one of a mitigation strategy, aresponse strategy, and a recovery strategy.
 15. The one or morenontransitory computer-storage media of claim 14, further comprisingcommunicating information associated with at least one of the mitigationstrategy, the response strategy, and the recovery strategy to anemergency responder network.
 16. The one or more nontransitorycomputer-storage media of claim 7, wherein presenting the informationassociated with the selected linear corridor includes presentinginformation associated with the critical asset, thereby allowing a userto view the critical asset in context of the information associated withthe critical asset.