The Technical Challenges of Homeland Security John R Wootton V. Pres. Technology Engineered Support Systems Inc.

Slides:



Advertisements
Similar presentations
PowerPoint ® Presentation Chapter 14 Homeland Security Homeland Security Building Layout Specific CBR Attack Prevention Recommendations Securing Outdoor-
Advertisements

WMD Crime Scene Management
DFF 2014 February 24, Self-adapting Sensor Networks for Semi- automated Threat Detection in a Controlled Area By Jorge Buenfil US ARMY RDECOM ARDEC.
Facilitating a Dialog between the NSDI and Utility Companies J. Peter Gomez Manager, Information Requirements, Xcel Energy.
Fuel Cells & Hydrogen Joint Undertaking Stakeholders General Assembly, October 27, 2009 SmartGrids A key step in the third industrial revolution Ronnie.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Security Controls – What Works
1 Geosciences Research Initiative All technologies envisioned to meet future energy and environmental demands require advances in fundamental.
MINISTRY OF SOCIAL AFFAIRS AND HEALTH 1 Introduction to corporate security Teemupekka Virtanen Helsinki University of Technology Telecommunication Software.
The Need for an Integrated View of Water Quality Modeling and Monitoring Bruce Kiselica USEPA, Region 2 Second Workshop on Advanced Technologies in Real.
Critical Infrastructure Interdependencies H. Scott Matthews March 30, 2004.
COUNTERINTELLIGENCE TRENDS
1 Kuwait Central Agency for information technology.
SUSTAINABLE ENERGY REGULATION AND POLICY-MAKING FOR AFRICA Module 14 Energy Efficiency Module 14: DEMAND-SIDE MANAGEMENT.
What is Smart Grid/Metering for electric distribution? Should they be implemented in the US? Presented by: Jeffrey Grodzki, April Romanishan, Cameron Hinkel,
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Submitted by: Abhashree Pradhan CA (1)
A Secure Frontline September 25, 2003
Jeffery Graviet Emergency Services Coordinator, Salt Lake County Chairperson, Salt Lake Urban Area Working Group.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
Created by Curt Harrell & Jesse Kuzy for THE DEPARTMENT OF HOMELAND SECURITY.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Radiological Terrorism: Introduction. Nuclear WMD Modern time weapons First used in WWII.
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
CRITICAL INFRASTRUCTURE & CONTINUITY OF OPERATIONS IN A POST 9/11 WORLD Presented by: Dr. Pamela Collins, EKU/JSC.
1 Web Commerce Definition Benefits Impacts Other Types of Electronic Commerce.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 London EUG, 15th September 2015 The work of Valencia Local Police: Validation of technical solutions to tackle metal theft José L. Diego
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Agricultural Investigations Law Enforcement Perspective.
Information Warfare Playgrounds to Battlegrounds.
1 Terrorist Use of WMD: A Concrete Threat? Dr. Yair Sharan –ICTAF Director 2nd Annual Arms Control Conference: New Trends in WMD.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
Water Security Updates & Initiatives Asset Management Workshop May 5, 2005 Presented by: Jim Wheeler Office of Wastewater Management U.S. Environmental.
HSARPA and Chemical Countermeasures for Homeland Security May 25-27, 2004 “NDIA Homeland Security Symposium”, Arlington, VA Dr. William S. Rees, Jr. Dr.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Bernards Township Office of Emergency Management February 28, 2012.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Security of Cyber-Physical Systems and Cross-SDO Collaboration 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
ISSUES OF NATIONAL SECURITY ARE NO LONGER SIMPLE!
Ad Hoc Network.
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
International Recovery Forum 2014 ~ The Role of Private Sector in Disaster Recovery ~ 21 January 2014 Kobe, Japan Dr Janet L. Asherson THE LINK BETWEEN.
North American Energy Infrastructure Policy Philip Gonda Steven Mays Robert Floyd Josh Kapp.
Information Warfare Playgrounds to Battlegrounds.
Advanced Technology Days 18. i 19. studenog 2015., Cinestar Arena Centar.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
1.Why it is important to study and understand information systems. 2.Distinguish data from information. 3.Name the components of an information system.
UNCLASSIFIED PROVIDING SAFE FRESHWATER FOR DISASTER RELIEF BGen John Broadmeadow, USMC Deputy Commander, MARFORPAC 14 Mar 2011.
1 Portland Office of Emergency Management (POEM) Urban Areas Security Initiative State Homeland Security Office of Domestic Preparedness - Grant Programs.
GIS From the back office to the enterprise Ciaran Kirk Technical Director, IMGS.
HSPD-7 Critical Infrastructure Identification, Prioritization and Protection: designates EPA as the sector-specific lead agency for critical water infrastructure.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
CS457 Introduction to Information Security Systems
EPA and Homeland Security
Disaster and Emergency Management
and Security Management: ISO 28000
The U.S. Department of Homeland Security
Chapter 1: Information Security Fundamentals
Presentation transcript:

The Technical Challenges of Homeland Security John R Wootton V. Pres. Technology Engineered Support Systems Inc

Subsidiary Overview KECO Marlo Fermont UPSI EASI Radian ESSIbuy.com SEI TAMSCO

Areas of Expertise Systems integration Electronics (Radio & target acquisition systems) Automatic test equipment Automation & material handling Heavy military mechanical systems (Trailers, logistics) Water & customized HVAV & environmental control systems Water & fuel distribution systems Chillers Pumps Fan coil units / assemblies Water purification systems Portable power generators Uninterruptible power suppliers NBC collective protection Asset protection Parts re-inventory Logistics & maintenance Diagnostics & prognostics Interactive electronic tech manuals Training E commerce

The Military Doesn’t Leave Home Without Us

RaRa RADIAN ASSET PROTECTION DIVISION

Outline Terrorist Objectives The Homeland Security Dilemma The Technical Challenges Facing Homeland Security Summary

Phases of Homeland Security Vigilance/Prevention/Security Under Attack First Reaction – Emergency Response Recovery/Stabilizing Return to normal

Terrorist Aims Mass Destruction Mass Disruption “Hitting” high profile/asset targets

Critical Infrastructure Dependencies Energy Telecommunications Transportation Banking and Finance Continuity of Government Services Water Supply Systems Gas and Oil Production Emergency Services

Technology Challenge (Vigilance/Prevention/Security) Is it possible to make a security system that is transparent to the law abiding citizen – provides unencumbered freedom of movement – while maintaining privacy – yet will recognize people of concern and block access to buildings, public works, etc to those people?

Technology Challenge (Vigilance/Prevention/Security) Is it possible to make a security system that is transparent to the law abiding citizen – provides unencumbered freedom of movement – while maintaining privacy – yet will recognize people of concern and block access to buildings, public works, etc to those people? Can the US citizens desire for privacy and the needs of National Security be mutually satisfied?

Technology Challenge (Vigilance/Prevention/Security) Is it possible to make a security system that is transparent to the law abiding citizen – provides unencumbered freedom of movement – while maintaining privacy – yet will recognize people of concern and block access to buildings, public works, etc to those people? Can the US citizens desire for privacy and the needs of National Security be mutually satisfied? Is it possible to have free exchange of technical information while still maintaining the balance for secrecy required for National Security?

Technology Challenge (Vigilance/Prevention/Security) Is it possible to make a security system that is transparent to the law abiding citizen – provides unencumbered freedom of movement – while maintaining privacy – yet will recognize people of concern and block access to buildings, public works, etc to those people? Can the US citizens desire for privacy and the needs of National Security be mutually satisfied? Is it possible to have free exchange of technical information while still maintaining the balance for secrecy required for National Security? Is it really possible to build a system that can identify a crime’s precursors, when the would be perpetrators are doing their best to be untraceable and unpredictable?

Technology Challenge (Vigilance/Prevention/Security) Is it possible to make a security system that is transparent to the law abiding citizen – provides unencumbered freedom of movement – while maintaining privacy – yet will recognize people of concern and block access to buildings, public works, etc to those people? Can the US citizens desire for privacy and the needs of National Security be mutually satisfied? Is it possible to have free exchange of technical information while still maintaining the balance for secrecy required for National Security? Is it really possible to build a system that can identify a crime’s precursors, when the would be perpetrators are doing their best to be untraceable and unpredictable? Are the FBI/CIA best equipped to build such a system?

Homeland Defense Soft Computing Technologies Computational Linguistics Fuzzy Logic Data Mining Neural Networks Expert Systems Evolutionary Systems Semantic Webs & Data Webs Biometrics Intelligent Agents

Technology Challenge (Vigilance/Prevention/Security) Every threat that requires people screening is currently monitored by a different system (explosives, weapons, biological, chemical, nuclear, radiological) – is it possible to design a system that can screen people for all possible threats, fast and at a reasonable cost, with acceptable (economical) false alarm rates, and with zero misses ?

Technology Challenge (Critical Infrastructure Protection) There are 2.4 million miles of pipe line in the USA carrying fuel and gas. Is it possible to totally secure and protect every mile of fuel and gas in this country?

Technology Challenge (Critical Infrastructure Protection) There are 2.4 million miles of pipe line in the USA carrying fuel and gas. Is it possible to totally secure and protect every mile of fuel and gas in this country? Is it possible and economical to real time monitor all public water systems intended to be used for drinking water to detect various levels of chemical biological and radiological contaminants?

Technology Challenge (Critical Infrastructure Protection) There are 2.4 million miles of pipe line in the USA carrying fuel and gas. Is it possible to totally secure and protect every mile of fuel and gas in this country? Is it possible and economical to real time monitor all public water systems intended to be used for drinking water to detect various levels of chemical biological and radiological contaminants? Is it possible to negate or mitigate deleterious effects on public health caused by the introduction of contaminants into drinking water to include the neutralizing of biological,chemical, and radiological contaminants?

Technology Challenge (Critical Infrastructure Protection) There are 2.4 million miles of pipe line in the USA carrying fuel and gas. Is it possible to totally secure and protect every mile of fuel and gas in this country? Is it possible and economical to real time monitor all public water systems intended to be used for drinking water to detect various levels of chemical biological and radiological contaminants? Is it possible to negate or mitigate deleterious effects on public health caused by the introduction of contaminants into drinking water to include the neutralizing of biological,chemical, and radiological contaminants? Is it possible to secure and protect our electrical supply system?

Technology Challenge (Critical Infrastructure Protection) There are 2.4 million miles of pipe line in the USA carrying fuel and gas. Is it possible to totally secure and protect every mile of fuel and gas in this country? Is it possible and economical to real time monitor all public water systems intended to be used for drinking water to detect various levels of chemical biological and radiological contaminants? Is it possible to negate or mitigate deleterious effects on public health caused by the introduction of contaminants into drinking water to include the neutralizing of biological,chemical, and radiological contaminants? Is it possible to secure and protect our electrical supply system? Is it possible to secure and protect our banking and financial system?

Technology Challenge (Critical Infrastructure Protection) There are 2.4 million miles of pipe line in the USA carrying fuel and gas. Is it possible to totally secure and protect every mile of fuel and gas in this country? Is it possible and economical to real time monitor all public water systems intended to be used for drinking water to detect various levels of chemical biological and radiological contaminants? Is it possible to negate or mitigate deleterious effects on public health caused by the introduction of contaminants into drinking water to include the neutralizing of biological,chemical, and radiological contaminants? Is it possible to secure and protect our electrical supply system? Is it possible to secure and protect our banking and financial system? Is it possible to secure and protect our telecommunications system? And our internet system? And provide cyber security?

Technology Challenge (Critical Infrastructure Protection) There are 2.4 million miles of pipe line in the USA carrying fuel and gas. Is it possible to totally secure and protect every mile of fuel and gas in this country? Is it possible and economical to real time monitor all public water systems intended to be used for drinking water to detect various levels of chemical biological and radiological contaminants? Is it possible to negate or mitigate deleterious effects on public health caused by the introduction of contaminants into drinking water to include the neutralizing of biological,chemical, and radiological contaminants? Is it possible to secure and protect our electrical supply system? Is it possible to secure and protect our banking and financial system? Is it possible to secure and protect our telecommunications system? And our internet system? Is it possible to secure and protect our transportation infrastructure?

Technology Challenge (Weapons of Mass Destruction) Sensors – Is it possible to design self calibrating, zero false alarm, fast, sensitive, chemical, biological and radiological near and remote sensors that are affordable and reliable?

Technology Challenge (Weapons of Mass Destruction) Sensors – Is it possible to design self calibrating, zero false alarm, fast, sensitive, chemical, biological and radiological near and remote sensors that are affordable and reliable? Individual Protection Suits. Is it possible to design an affordable suit for first responders that is comfortable to wear and operate in for many hours, while providing total individual protection?

Technology Challenge (Weapons of Mass Destruction) Sensors – Is it possible to design self calibrating, zero false alarm, fast, sensitive, chemical, biological and radiological near and remote sensors that are affordable and reliable? Individual Protection Suits. Is it possible to design an affordable suit for first responders that is comfortable to wear and operate in for many hours, while providing total individual protection? Collective Protection. Is it possible to design a fast response, affordable collective protection system capable of being adapted as a first response field hospital or a control center?

Technology Challenge (Weapons of Mass Destruction) Sensors – Is it possible to design self calibrating, zero false alarm, fast, sensitive, chemical, biological and radiological near and remote sensors that are affordable and reliable? Individual Protection Suits. Is it possible to design an affordable suit for first responders that is comfortable to wear and operate in for many hours, while providing total individual protection? Collective Protection. Is it possible to design a fast response, affordable collective protection system capable of being adapted as a first response field hospital or a control center? Immunization. Is it possible to provide sufficient safe vaccine against all known biological threats to the civilian population?

Technology Challenge (Weapons of Mass Destruction) Sensors – Is it possible to design self calibrating, zero false alarm, fast, sensitive, chemical, biological and radiological near and remote sensors that are affordable and reliable? Individual Protection Suits. Is it possible to design an affordable suit for first responders that is comfortable to wear and operate in for many hours, while providing total individual protection? Collective Protection. Is it possible to design a fast response, affordable collective protection system capable of being adapted as a first response field hospital or a control center? Immunization. Is it possible to provide sufficient safe vaccine against all known biological threats to the civilian population? Isolation. Is it possible to contain biological contamination by isolation?

Technology Challenge (Weapons of Mass Destruction) Sensors – Is it possible to design self calibrating, zero false alarm, fast, sensitive, chemical, biological and radiological near and remote sensors that are affordable and reliable? Individual Protection Suits. Is it possible to design an affordable suit for first responders that is comfortable to wear and operate in for many hours, while providing total individual protection? Collective Protection. Is it possible to design a fast response, affordable collective protection system capable of being adapted as a first response field hospital or a control center? Immunization. Is it possible to provide sufficient safe vaccine against all known biological threats to the civilian population? Isolation. Is it possible to contain biological contamination by isolation? Decontamination. Is it economically feasible to effectively decontaminate large areas, large buildings etc

Technology Challenge (First Responders) Training of first responders – Is simulation an adequate/effective way of training first responders? Who should be trained? What foreknowledge do the responders need to be adequately equipped to handle a disaster?

Summary The technical challenges presented by Homeland Defense are both vast, multi disciplined and dimensional Some we are only just starting to address Some are in the very difficult category Some might be in the too difficult class We must not slip into solving only those problems that we can solve at the expense of the others There are some tough challenges