“Quality Security Solutions - On Time, On Cost, and As Promised.” 1 UNCLASSIFIED Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD 781-377-5845.

Slides:



Advertisements
Similar presentations
Systems Security Engineering An Updated Paradigm INCOSE Enchantment Chapter November 8, 2006 John W. Wirsbinski.
Advertisements

NERC Critical Infrastructure Protection Advisory Group (CIP AG) Electric Industry Initiatives Reducing Vulnerability To Terrorism.
Enterprise Grants Management The Time is Right. Transformation From To.
Presentation by Priyanka Sawarkar
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Telstra in Confidence Managing Security for our Mobile Technology.
ISS IT Assessment Framework
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
Information Systems Security Officer
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
C4ISR and Information Warfare
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
CMMI Overview Quality Frameworks.
Stephen S. Yau CSE , Fall Security Strategies.
Army Doctrine Publication (ADP) 3-37; and Army
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
Information Technology Audit
2015 World Forum on Energy Regulation May 25, 2015
US Army Medical Materiel Agency (USAMMA) Advanced Planning Briefing for Industry (APBI) & Small Business Conference.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
A Secure Frontline September 25, 2003
1 Autonomic Computing An Introduction Guenter Kickinger.
DoD Acquisition Domain (Sourcing) (DADS) Analysis of Alternatives (AoA) E-Business/SPS Joint Users’ Conference November 15-19, 2004 Houston, TX.
Duke Medicine IT Strategy Jeffrey Ferranti, MD Chief Information Officer / VP Medical Informatics Duke Medicine April 17, 2015.
Chemical & Biological Defense Program Science & Technology
Your Financial Work Defense Finance and Accounting Service DFAS Transformation Update March 2003.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Radar Open Systems Architectures
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
From the Installation and Certification Group to the Engineering and Development Section Patrick Grenard Chief, Engineering & Development, IMS Vienna International.
Import of New Security Environment Keys to Transformation: Exploit Technology Exploit DOD ability to integrate processes Result: JV2010 Vision shall.
C4ISR and Information Warfare Naval Weapons Systems.
1. 2 USAF CONOPS & AIR AND SPACE POWER REVIEW Chap 23 & 24.
Network security Product Group 2 McAfee Network Security Platform.
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
Physical (Environmental) Security
PARTNERING for your INTERESTS Companies invest in security to protect their people, property and information. In doing so, they are also protecting the.
Certified Protection Officer Program. Chapter 1 Unit 1 Concepts and Theories of Asset Protection Pages 3-11.
Smart Home Technologies
Mine Warfare - A Total Force Approach for the Future
U.S. Army Corps of Engineers (USACE) AEC Utility Monitoring And Control Systems and Electronic Security Systems (UMCS)(ESS) Prepared for: Energy Huntsville.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Guardian Overview Brief
1 27 August 2009 Maryfrances Herrera Safety and Security Interface.
USJFCOM 27 Jul EXECUTIVE OVERVIEW Col David Brown, USAF JFIIT Commander UNCLASSIFIED Joint Fires Integration and Interoperability Team (JFIIT)
Generic competencesDescription of the Competence Learning Competence The student  possesses the capability to evaluate and develop one’s own competences.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Office for Domestic Preparedness Overview Briefing Bob Johns Branch Chief State and Local Program Management Division June 4, 2003 Department of Homeland.
LOG 101 Curriculum Review 28 Jun 02 Richard A. Andrews, CPL Course Manager.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
S&T Component of the CBDP Dr Chuck Gallaway DTRA/CB Worldwide Chemical Conference 23 Oct 03.
10. Security and Physical Protection Basic Concepts
INMM Nuclear Security and Physical Protection Technical Division.
CRESST ONR/NETC Meetings, July July, 2003 ONR Advanced Distributed Learning Bill Kaiser UCLA/SEAS Wireless Networked Sensors for Assessment.
CMMI Certification - By Global Certification Consultancy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
UNCLASSIFIED 6/24/2016 8:12:34 PM Szymanski UNCLASSIFIED Page 1 of 15 Pages Space Policy Issues - Space Principles of War - 14 June, 2010.
Proactive Incident Response
Terrorism Risk Assessment and Management (TRAM) Methodology Overview Briefing June 6, 2008.
Name of the idea Description and Military Application Maturity
AF NL Force Integration
Name of the idea Description and Military Application Maturity
Single Point of Entry (SPOE)
Joint Protection of the Sea Base
NERC Critical Infrastructure Protection Advisory Group (CIP AG)
Presentation transcript:

“Quality Security Solutions - On Time, On Cost, and As Promised.” 1 UNCLASSIFIED Lt Col Don Wussler Director Force Protection C2 Systems ESC/FD June 2003 Force Protection Technology

“Quality Security Solutions - On Time, On Cost, and As Promised.” 2 UNCLASSIFIED Overview  Integrated Base Defense  System Effectiveness Assessment  Force Protection Technology  Integrated Base Defense Security System  Force Protection Common Operating Picture

“Quality Security Solutions - On Time, On Cost, and As Promised.” 3 UNCLASSIFIED Integrated Base Defense The integrated application of security systems taken across the Force Protection (FP) battlespace and extending beyond the physical perimeter into an area of influence and interest Involves the integrated use of tactics, techniques, procedures, and technology – Includes Transformational “Leap Ahead” Technologies IBD Security System (IBDSS) requirements identified in the (draft) IBDSS ORD – Area intrusion detection, access control, alarm assessment and reporting, integrated C2 and display, delay/denial “See First, Understand First, Act First”

“Quality Security Solutions - On Time, On Cost, and As Promised.” 4 UNCLASSIFIED New Approach - Effects Based  Performance vice compliance based physical security system design and evaluation methodology  Systems approach based on risk, consequence, & performance  Identifies effectiveness of existing and conceptual systems  Identifies risk to resources  Treats all aspects of an area as one system  Technology, equipment, manpower, policy, procedures  Modeling & Simulation  Employs teaming approach  Right people at right time Define Threat Analyze Threat Identify Vulnerabilities Identify Alternatives (Solutions) Analysis of Alternatives Cost-Effective Solution

“Quality Security Solutions - On Time, On Cost, and As Promised.” 5 UNCLASSIFIED Physical Security System Functions Detection Intrusion Sensing Alarm Communication Alarm Assessment Entry Control Delay Passive Barriers Active Barriers Passive Barriers Active Barriers Response Interruption: – Communication to Response Force – Deployment of Response Force Neutralization Physical Security System Functions

“Quality Security Solutions - On Time, On Cost, and As Promised.” 6 UNCLASSIFIED Systems Effectiveness Assessment Probability of a “Gunfight” = P I Detection Delay Response Force on Force Probability of “winning” the Gunfight = P N Probability of Success = Effectiveness P E The Model

“Quality Security Solutions - On Time, On Cost, and As Promised.” 7 UNCLASSIFIED Force Protection Technology Integrated Circuits  TASS  AECS Deployable P-51 F-4 F-15 F-22 MK1 Eyeballs  Close-In  Close Boundary  Preventive Perimeter  Distant Support 1.0 Pd (Assumed).2 Pd (Reality) “The F-22 will give us a leap in capability over the F-15 as the F-15 gave us over the F-4.” Gen John P. Jumper Integrated Base Defense 2005  Standoff Detection  Track  Classify  IFF  Non-lethal Denial  IBD C2 Effects-Based Electrons in Close Formation  SPCDS  Fence Sensor  Buried Line Sensor  CCTV Fixed COMMON PICTURE

“Quality Security Solutions - On Time, On Cost, and As Promised.” 8 UNCLASSIFIED “The Pathfinder Project” Description  “Pathfinder Bases” are benchmarks to determine effects and cost of technology  Andrews AFB selected as first “Pathfinder  Pathfinder consists of tailored and scalable tactics, techniques, procedures and transformational technologies  Focused on reducing the current reliance on manpower Today Effective ness Technology & Manpower Effective ness Technology & Manpower Tomorrow

“Quality Security Solutions - On Time, On Cost, and As Promised.” 9 UNCLASSIFIED Why IBDSS?  Integrated Base Defense (IBD) CONOPS 2020: “…emergent needs demand an accelerated effort to adopt the integrated base defense mindset and incorporate advanced technology into our tactics, techniques, and procedures.”  Directions from BGen Shamess, USAF/XOF: -- The key to optimization of manpower associated with base defense is the integration of security systems to remove stovepipes and provide the defender with the ability to “See First, Understand First, and Act First.” IBDSS will be the enabler for this vision

“Quality Security Solutions - On Time, On Cost, and As Promised.” 10 UNCLASSIFIED Effects-Based IBD Physical Security System Acquisition and Integration IBD Physical/ Electronic Security System People IBD Plan AC2ISR Firepower TTP INTEGRATION Performance Based IBD Technology Acquisition Design Engineer Procure Install / Integrate Test [OPERATE] Sustain Dispose Required IBD Elements Anticipate Deny Detect Assess Delay Neutralize SYSTEM OBJECTIVE (AFI ) “greatest possible deterrence” “maximum means to achieve:  detection  interception, and  defeat of a hostile force before it is able to seize, damage, or destroy resources”

“Quality Security Solutions - On Time, On Cost, and As Promised.” 11 UNCLASSIFIED Acquisition Strategy IBDSS Architecture IBDSS CONTRACT Delay/ Denial Fixed Sites Tactical Systems Logistics Technology Tech Standards Strategic Nuclear Integration Test

BuildingBuilding Force Protection Common Operating Picture the

How to “Connect the Dots” Common Interface Standard: XML/XLS Sample Document USAF ETASS The XML Pages This is element text and an entity follows:&Description; Smart Sensors Plug into the Force Protection Picture Force Protection Common Operating Picture Chemical TIB Picture Biological TIB Picture Environmental Picture Radiological/Nuclear/TIR Picture Fire Picture Medical Picture High Yield Explosive Picture Security Forces Picture Translates to Output Full Spectrum Threat Response Threat Management Access Management Delay/Denial/Response

Dominate The Battlespace ACT FIRST  Determine Options  Decide First  Act to Remove Threat UNDERSTAND FIRST  Tailor Defense Plans  Identify Vulnerabilities  Know and Manage Risks SEE FIRST  Relentless Data Capture  Detect/Identify Threat  Predict Threat COAs