ASIS 25th New York City Security Conference and Expo.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Company Presentation.
Homeland Security Ships and Ports © All Copyright GT Aviation 2004 G.T Consulting.
1 Protecting the Long Island Business Community A Public Safety Partnership.
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
ODS3F –Observation and Detection Systems For Forest Fire Monitoring
1 Rules for the Use of Force in Military Law Enforcement and Security Duties.
Cyber and Maritime Infrastructure
CCTV TECHNOLOGY AND PRIVACY CONCERNS Susan F. Brinkley, Ph.D. University of Tampa.
Terrorism and Security Matrix Inspired by the Haddon Matrix Kent Roach Anti-Terrorism and Privacy, One Year After Privacy and Security: Totally Committed.
The Role of ITS Technology for Homeland Security Kentucky’s Experience.
The Role of Global Positional Systems in Policing and Crime Prevention William J. Artis Jr. FRS 142: Where’s Waldo April 19, 2004.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
“Think Security”. Supply Chain Security On the Southern Border.
Image Processing of Video on Unmanned Aircraft Video processing on-board Unmanned Aircraft Aims to develop image acquisition, processing and transmission.
Industry as a Partner to Achieve Maritime Infrastructure Protection (MIP) and Freedom of Navigation (FON) 28 October 2014 Mr. Thomas Jones Vice President,
Security of Public Transport in the United States Chief Michael Taborn Metro Transit Police Department January 28, 2011 Metro Transit Police Department.
TYPES OF RADAR SYSTEMS ELC 451E.
Aerospace Engineering By Patrick Ferrell. Aerospace Engineering is the main branch of engineering concerned with the research, design, development, construction,
Chapter 2 Modern Private Security
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
Efficient Transit Solutions for Reduced Costs of Trading Efficient Transit Solutions for Reduced Costs of Trading - Uganda’s Experience WCO IT Conference.
F E D E R A L A V I A T I O N A D M I N I S T R A T I O N A I R T R A F F I C O R G A N I Z A T I O N Northeastern Area States Aviation Committee Temporary.
Unmanned Aerial Vehicles “Drones”
Aerobus Safety & Security Proactive Measures to assure Aerobus passenger and system Safety & Security.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Session 131 A community profile provides a base for overlay analysis and for discussing a hazard’s impacts on a community.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
Autonomous Machines By: Tyler Roberts.
Massachusetts Institute of Technology 4 April 2003
NOAA’s Role in Weather Forecasting and Community Preparedness Decision Support NOAA remains focused on supporting high impact events where weather is a.
A Military Logistics and Transportation Security Application.
Information Warfare Playgrounds to Battlegrounds.
AEM 5333 UAV Search and Surveillance. Mission Description Overhead surveillance and tracking – Humans on foot – Moving vehicles Onboard GPS transceiver.
Massachusetts Digital Government Summit / Session - Smile You're On CameraPage 1.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
1 Introduction to Security Chapter 14 Securing the Infrastructure.
United Nations World Food Programme Fighting Hunger.
1 Civil Air Patrol United States Air Force Auxiliary …performing Missions for America.
Transportation Security: The Threat, The Challenges and Our Next Steps Eva Lerner-Lam Chair, ASCE Transportation Security Committee American Society of.
Projectile Kinetic Energy Reduction System (PKERS)
Drones By James Riedel & Phillip Schrank. Overview What is a Drone? What do they do? What has gone wrong with them? Is there a place for them in our future?
AIRPORT SECURITY TECHNOLOGY V/S TERRORISM.
Information Warfare Playgrounds to Battlegrounds.
Proposal of a new venture for national security. Pre-emptive security means a system designed to deter any attempt of offense before taking place physically.
Governor’s Office of Homeland Security and Emergency Response State Directors Meeting February 24, 2014 Bruce A. Davis, Ph.D. Senior Program Manager Resilient.
1 Center for the Collaborative Control of Unmanned Vehicles (C3UV) UC Berkeley Karl Hedrick, Raja Sengupta.
SPANISH NATIONAL POLICE INNOVATION & DEVELOPMENT SERVICE LOGISTICS GENERAL DIRECTORATE SMI2GS - H2020, BRUSSELS 26 & 27 February 2016 H2020 (CALL 2016)
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
Light-Portable Synthetic Aperture RADAR
Jessica Prochut Unmanned Aerial Vehicles "Drones".
Civil Aviation Security Program The FBI’s Counterterrorism Division’s (CTD) Civil Aviation Security Program (CASP) is responsible for Criminal and Terrorism.
Horizon 2020 Secure Societies Secure Societies Briefing Day 21 January /06/2016.
DRONES IN AERIAL SURVEILLANCE WHAT IS A DRONE ?  A drone, in a technological context, is an unmanned aircraft.  Drones are formally known as unmanned.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Presentation of equipment.
Disaster and Emergency Management
Road Safety Behaviour Symposium: New technology, new connectivity
Critical Infrastructure in Varna
and Security Management: ISO 28000
SMART CIBER Third partner meeting Varna
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
Copyright © 2012, Elsevier Inc. All rights Reserved.
Targeted surveillance
Federal Protective Service
ASIS 25th New York City Security Conference and Expo
Role of US Security and Intelligence Agencies
Warm Up – April 2 Answer the following question on a post it:
EFCOG Design Basis Threat Update/ Unmanned Aircraft Systems Overview
Presentation transcript:

ASIS 25th New York City Security Conference and Expo

Session 1202 The Threat from Unmanned Vehicles April 22, 10:00 AM - 11:00 AM Bruce E. Wimmer, CPP, CHS-III James A. Acevedo, CPP, CPS

Emerging Threats from Unmanned Vehicles Challenge: To Think “Outside of the Box”

Risk-based Approach Will examine Threats; potential Vulnerabilities; and Consequences Unmanned vehicles of all types: Aerial- based Land-based Water-based Combined Single vehicle or “swarms” “Outside of the Box”

▪ Terrorism ▪ Radical Cause-Oriented Groups (e.g. environmentalists) ▪ Criminal or State Controlled ▪ Theft ▪ Smuggling ▪ Robbery ▪ Kidnapping/Ransom/Extortion ▪ Business Espionage ▪ Invasion of Privacy Source of Threats

Platform for moving payload or delivering payload Aerial: Land-based: Ground-based vehicle or robot (e.g. security or cleaner) Disguised as toy or model Means:

Means: (continued) Water-based: Surface Underwater Both Disguised as toy or model

Means: (continued) Payload/Platform for: Explosives Gas or chemical Firearms Cameras (transmit or record/includes IR) Electronic intercept (e.g. audio) Ramming Cutting or severing

Challenge: Is this a “friend” or “foe”? Is this a toy, a threat or both? Is this willful or an accident?

Security related missions affected: Executive Protection IP/Trade Secrets Protection Supply Chain Security Perimeter Control (warehouse, manufacturing facility, high- rise/office, residence, school, prison, military, critical infrastructure) Other Physical Security

Security related missions affected: (continued) Access Control Loss Prevention Passenger or Cargo Craft Security: Aerial (private aircraft, passenger aircraft, military) Land (automobiles, SUVs, armored/unarmored, trucks) Water (ferries, cargo, cruise, military)

Security related missions affected: We are now transitioning to examining Vulnerabilities!

Operational Considerations Airborne Obstacles 1. Wind 2. Wires 3. Trees 4. Other Moving Objects 5. Speed 6. Visibility / Detectability

LEGAL IMPLICATIONS “WHEN UNMANNED VEHICLES ARE OUTLAWED … ONLY THE OUTLAWS WILL HAVE UNMANNED VEHICLES”

LEGAL WHAT’S ▪ Differentiating GOOD V. BAD ▪ Do laws make a difference? – Only if you have power to enforce/apply meaningful penalties for violations ▪ DEFENSIVE COUNTER- MEASURES ▪ Legality of jamming, shooting

UNMANNED VEHICLES  Affordable  User Friendly  Stable platform  Programmable (even for a novice)  Program a route using online mapping  GPS  Easily modified (instructions on YouTube)  Camera  Beer  Gun  Taser  Anything

SYSTEMS AVAILABLE NOW  Have on-board targeting system  Systems can track via –  Transmitter  GPS waypoints  Specific colors  Phones  Shapes  Anything you can imagine

APPLICATIONS CURRENTLY IN USE  Police Officers  Surveillance  Target Identification  Security Officers/Maintenance Personnel  Patrolling pipe-lines in Alaska  Power lines in the Southern States  Civilians  Home movies  Photography  Media outlets

SYSTEMS AVAILABLE/UNDER DEVELOPMENT  Fully autonomous unmanned vehicles/robots

33 LBS. Payload - Flight time over 60 min.

DEMO WARNING Watch out for low flying vehicles…enjoy

Questions? Bruce Wimmer, CPP - Senior Regional Consultant, G4S Risk Management Services James A. Acevedo, CPP, CPS - Executive Director, International Operation, Andrews International