First Responders Give NIST Their Communications Tech Wish Lists

First Responders Give NIST Their Communications Tech Wish Lists

Our first responders have spoken. An extensive research project conducted by experts at the National Institute of Standards and Technology (NIST) reveals what our country’s police, fire, emergency medical and 911 dispatch responders think about the communications technology they use on a regular basis and how they would like developers to improve it in the future.

More than five years in the making, the Voices of First Responders project reflects the input of 7,182 respondents to a survey NIST conducted of first responders hailing from across the country, from large cities and suburbs to small towns and rural areas. The results of the study, the largest of its kind ever to investigate public safety personnel user experiences, provide a wealth of data intended to help developers of communications technology create more useful devices for the field.

“First responders are people who go to the scene with the goals of saving lives and protecting the public,” said Yee-Yin Choong, an industrial engineer at NIST. “We set out to understand this technology from their perspective, to find out what is working for them and what isn’t.”

While the results fill more than a dozen publications, some overarching messages stand out, including three interrelated requests that first responders made: Public safety communications technology should be trustworthy, be controllable and reduce user frustration.

“Our findings are aimed at the research and development community, but we are also trying to reach administrators who make purchases,” she said. “Technology needs to be trustworthy, and the users need autonomy over it. Our results indicate that if you focus on those things, the users will be happier.”

The team also distilled the study data into six guidelines for future technology development:

Improve current technology — more important than developing new technology is improving what first responders currently have.

Reduce unintended consequences — develop technology that does not interfere with or distract from first responders’ attention to their primary tasks.

Recognize that “one size does not fit all” — technology must accommodate public safety’s wide variety of needs, across disciplines, districts and contexts of use.

Minimize “technology for technology’s sake” — develop technology with and for first responders driven by their user characteristics, needs and contexts of use.

Lower product and service costs — develop technology at price points that departments find affordable and also scalable for widespread distribution.

Require usable technology — technology should make it easy for the user to do the right thing, hard to do the wrong thing, and easy to recover when the wrong thing happens.

The team began its investigation by interviewing about 200 first responders from across the country to gain a general understanding of how they used communications devices. From this information, the team developed a more detailed survey about particular pieces of technology — from radios and phones to laptops to the headsets and earpieces that call center dispatchers use — and details about them, such as frequency of use and the problems they presented.

After obtaining the raw survey results, the team spent three years analyzing the interview and survey data and developed a total of 14 publications detailing the findings. Four are NIST Special Publications (SPs), each of which concerns the technology needs of one of the four first responder communities. The remaining 10 are NIST Interagency Reports (NISTIRs), which focus on the interview and survey data across all four communities.

“Technology needs to be trustworthy, and the users need autonomy over it. Our results indicate that if you focus on those things, the users will be happier.” —Yee-Yin Choong, NIST industrial engineer

The data are freely available online, and the team has made it possible to enter specific queries and create charts that allow for more effective analysis.

“For a developer, the data might help you design a better radio, but it also might give you information you never thought of,” Choong said. “One police officer said his body camera needs to show the court exactly what he saw. It should indicate that he was upside down and in the dark, but it shouldn’t change the video contrast, which can make it appear that something in that dark room was plainly visible.”

The study fills a gap in public safety communications technology research. Previous research efforts by other organizations have focused on the technology itself, not users’ interactions with it in real-world situations, Choong said.

“Before our project there was no systematic method for looking at the users’ needs and the problems they have faced,” she said. “We did not have any preconceived ideas of what we would learn, but we were rigorous in our methodology for obtaining the data. We include the details so that it can be useful in domains beyond public safety communications research.”

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.