The Value of an Urban Blast Tool

Thanks to lightning-fast software from the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), if a truck bomb was discovered in Lower Manhattan we will now be able to predict the likely damage patterns in the surrounding areas, and prioritize the first responders’ activities long before the bomb’s acoustic shockwave ricocheted out at the speed of sound.

It’s called the Urban Blast Tool (UBT), and it stores a table of pre-calculated pressure loads that would course down Lower Manhattan’s canyons after a range of blasts, from a humble car bomb to a massive truck bomb packing many times the payload of the Oklahoma City bomb.

For decades, such predictions stumped the fastest computers. Now, answers can be generated on a humble PC. The Urban Blast Tool was developed for S&T by Weidlinger Associates of New York. Using a dead-accurate city model already known, the software determines the damage building by building. Lower Manhattan has already been modeled and, pending Congressional funding, it will be joined by Midtown Manhattan and then parts of Los Angeles, Chicago, Washington, and Boston.

Each street in an urban area is a labyrinth of crevices, corners, and contours, where the course of a shockwave never could run smooth. These irregular features make a tough challenge tougher. When a shockwave strikes a building, some of its energy is absorbed; the remainder glances off, as a reflection. More often than not, the reflection rejoins the shockwave, making the wave more focused…and more violent. Blocks away, buildings and people will feel the punch. At 10 blocks, the wave may be packing only 1 pound per square inch (1 psi). But that’s enough force to shatter windows and buckle walls.

After 9/11, scientists tried to model how a blast’s shockwave would travel down specific urban canyons: If a bomb this size is set off at that spot, will the tower over there progressively fail? Will its beams hang low? Will occupants be able to evacuate safely? Safe evacuation is the most immediate concern.

These questions went unanswered because blast simulations weren’t reliable. Beams, waves, and reflections trade energy in an intricate dance, especially within the bulls-eye of the blast, where pressures are extreme. Supercomputers running computational fluid dynamics can calculate the pressures as a shockwave radiates, but this can take weeks. In order to evacuate the most vulnerable buildings immediately, responders must size up the danger in minutes once a possible vehicle bomb is discovered.

In 2008, S&T began to look beyond the eye of the blast. After all, a blast would deliver much of its wrath blocks away and at lower pressures the force and effects could be calculated in mere seconds. Why not use computational fluid dynamics to pre-calculate the initial blast loads in fine detail, and store those results? Then, if an actual bomb explodes, responders and planners can call up these known values and crunch them through modeling software to warn responders of which structures may soon fail.

Lower Manhattan comprises some 100 city blocks and hundreds of tall buildings. Their makeup is no mystery: Google Earth and Google Streets know each streetscape, from every angle. Indeed, a vibrant community of Googlers has re-created a 3D model of each building, plaza, and park. Using these models as building blocks, Weidlinger built a virtual replica, fashioned from 1s and 0s.

To give the shockwave calculations a running start, Weidlinger drew on physics-based analytical software codes the company had developed for the Department of Defense (DOD). American soldiers in Baghdad were facing truck bombs daily. Earlier, to better understand that threat, DOD had conducted tests for which Weidlinger had modeled blast pressures and structural damage. The company applied this experience to the Urban Blast Tool.

 The first code for the model predicts a blast’s shock physics in all three dimensions, from its opening thunder through its closing whimper. Weidlinger determined how a blast’s force would rise and decay as the wall of heated air fanned out, confronting specific buildings in its path.

A second code analyzes a building’s strength and predicts distant damage, right down to the floor joists. Using codes, a blast wave propagation and structural response could be modeled for a typical sample of the area buildings, over a range of blast threats. Together, these models form a library—a cheat sheet—that makes quick work of calculating downstream damage. And it’s done in seconds.

Since the software’s interface was built on Google Earth, it has a familiar look and feel as demonstrated here. That familiarity can be a life-saver after a bomb explodes, and responders, racing to the scene, may have just minutes to determine which buildings may tumble.

With the Urban Blast Tool software comes another important piece of software: the Emergency Evacuation, Rescue and Recovery Model (EERR). This companion software can evaluate the odds that a column will fail, and its emergency systems suffer damage, no matter whether a building is made of steel frames, reinforced-concrete frames, or flat plates.

The Urban Blast Tool and EERR are the crown jewels of a suite of S&T-funded applications designed to help cities protect infrastructure from blasts.

Says architect Mila Kennett, the S&T program manager who oversaw the software’s development: “We will offer the entire suite at no charge to emergency planners, DHS agencies, and credentialed architects, engineers, and building owners. Using our new software, they’ll be able to identify safer evacuation routes, design more-blast resistant buildings, and fortify older buildings.”

Like other S&T-funded technologies, the Urban Blast Tool is merely one weapon in a responder’s toolkit. But on the urban battlefield, where threats require a layered defense, each layer counts.

“We can’t thwart every bomb,” says Kennett, “But here at S&T, we always looking for innovative solutions to protect more lives.”

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3