mobile phone user (Don Pablo/

Navy wants 'see something, send something' system

The Naval District Washington is looking for vendors that can make it easier for analysts to react to reports of suspicious activity in real time.

The capability must integrate with a smartphone-based app that allows untrained users to collect and record suspicious activity and images, then easily and remotely upload the information to the Defense Department's system of record for suspicious activity reporting. The vendor also must supply analytical tools, such as facial recognition and geo-mapping technologies, so security analysts can quickly identify threats, spot trends and share the information horizontally through the NDW area of operations, according to a sources sought notice.

The reported information would be housed in the eGuardian suspicious activity reporting system, which is a sensitive but unclassified threat tracking and management system. eGuardian, which was developed in 2007 and is managed by the FBI, is designed to collect terrorist threat information and suspicious activity so it can be shared with other federal, state, local and tribal law enforcement offices.

A number of state and local governments have developed similar smartphone-enabled "see something, send something" apps that make it easier for the public to report suspicious activity.

After the shooting at Marjory Stoneman Douglas High School in Parkland, Fla., state officials announced the launch of Fortify Florida, an app that allows students and the community to relay information anonymously concerning unsafe, potentially harmful, dangerous, violent or criminal activities -- or the threat of these activities -- to appropriate public safety agencies and school officials.

Northern Virginia residents can use the iWatchNOVA app to report suspicious activity that may indicate terrorist or significant criminal activity. Information collected through the app is evaluated, analyzed and disseminated by the Northern Virginia Regional Intelligence Center, a Department of Homeland Security-recognized fusion center.

About the Author

Susan Miller is executive editor at GCN.

Over a career spent in tech media, Miller has worked in editorial, print production and online, starting on the copy desk at IDG’s ComputerWorld, moving to print production for Federal Computer Week and later helping launch websites and email newsletter delivery for FCW. After a turn at Virginia’s Center for Innovative Technology, where she worked to promote technology-based economic development, she rejoined what was to become 1105 Media in 2004, eventually managing content and production for all the company's government-focused websites. Miller shifted back to editorial in 2012, when she began working with GCN.

Miller has a BA and MA from West Chester University and did Ph.D. work in English at the University of Delaware.

Connect with Susan at [email protected] or @sjaymiller.


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.