Emerging Technologies for Homeland Security John Stammreich Vice President - Homeland Security Boeing Phantom Works October 2004.

Slides:



Advertisements
Similar presentations
Swedish Agency for Innovation Systems. Interaction between the actors –the Triple Helix Research Politics Business Researchers who are prepared to exploit.
Advertisements

Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Systems Engineering in a System of Systems Context
The State of Security Management By Jim Reavis January 2003.
All Rights Reserved: JusticeExperts.com Enterprise? What Enterprise? Enterprise Development.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Asia Pacific Economic Cooperation Transportation Working Group ITS Experts Group Chicago, Illinois September 2002 Walter Kulyk, P.E. Director, Office of.
BPT 3113 – Management of Technology
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
© 1998 Concept Five Technologies Enterprise Application Integration Capability Maturity Model.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
California Common Operating Picture (Cal COP) for Public Safety
C4ISR via OA Mike Danjczek November, 2014 Copyright GTS 2014.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Overview of Sales Management and the Selling Environment
CPTE 209 Software Engineering Summary and Review.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Program Manager, Information Sharing Environment UNCLASSIFIED ISE Enterprise Architecture and Common Standards Program.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Ohio Transportation Planning Conference July 16, 2014.
Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating Efficiencies Empowering Citizens Transforming Services Creating.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Chapter 1 Software and Software Engineering. A Quick Quiz 1. What percentage of large projects have excess schedule pressure? 25% 50% 75% 100% 2. What.
1 Table of Content 1.Business Diagnostic - Establishing a case for change –Changes in demand –New opportunities –Emerging threats 2.Vision Creation - Defining.
Process of Technological Change: Innovation
I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters U.S. Air Force 1 Lt Gen Bill Lord, SAF/CIO A6 Chief of Warfighting Integration and.
Challenges in Urban Meteorology: A Forum for Users and Providers OFCM Workshop Summaries Lt Col Rob Rizza Assistant Federal Coordinator for USAF/USA Affairs.
Association of Defense Communities June 23, 2015
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
Strategic Mobility 21 Focused on Making Decision Relevant Data A Logistics Multiplier in All Domains Strategic Mobility 21 Focused on Making Decision Relevant.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
NEET Workgroup #3 - Residential Subgroup Snohomish County PUD November 2008.
1 World Wide Consortium for the Grid Global Grid Forum Network-Centric Operations Community Session 28 June
0 Peter F. Verga U.S. Department of Defense 2 Definitions Homeland Security – A concerted national effort to prevent terrorist attacks within the United.
Smiths Aerospace Sense and Respond Logistics Forum Defense Acquisition University September 21, 2006.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
ARTIFICIAL INTELLIGENCE FOR HOME LAND SECURITY. THE AUTHORS Phd, Information Systems from New York University Management information systems, University.
Identification of national S&T priority areas with respect to the promotion of innovation and economic growth: the case of Russia Alexander Sokolov State.
Key Challenges Facing an Integrated Information System for Global Climate Observations presented by The Boeing Company Phantom Works S&IS Mission Systems.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
SBIR Final Meeting Collaboration Sensor Grid and Grids of Grids Information Management Anabas July 8, 2008.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
Information & Decision Superiority Case studies in applying AI planning technologies to military & civil applications Dr Roberto Desimone Innovations.
March 2004 At A Glance NASA’s GSFC GMSEC architecture provides a scalable, extensible ground and flight system approach for future missions. Benefits Simplifies.
C4ISR for the Military: Development and Implementation Presentation to the Security Network’s C4ISR, Robot Platforms, and Sensor Conference Greg Collins,
Microsoft in Defence Michel van der Bel Vice President Microsoft International.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
US Coast Guard Overview Hampton Roads AFCEA 1. US Coast Guard: Stats Workforce: AD, 7500 Reserves Assets: –Shore locations: 945 –Ships (>65’): 247.
1 Power to the Edge Agility Focus and Convergence Adapting C2 to the 21 st Century presented to the Focus, Agility and Convergence Team Inaugural Meeting.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Technology-enhanced Learning: EU research and its role in current and future ICT based learning environments Pat Manson Head of Unit Technology Enhanced.
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Network Centric Planning ---- Campaign of Experimentation Program of Research IAMWG Dr. David S. Alberts September 2005.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
1 Acquisition Automation – Challenges and Pitfalls Breakout Session # E11 Name: Jim Hargrove and Allen Edgar Date: Tuesday, July 31, 2012 Time: 2:30 pm-3:45.
1 CDC Health Information Exchange (HIE) Accelerating State-wide Public Health Situational Awareness in New York Through Health Information Exchanges August.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
IT Governance at the SCO
ASSET - Automotive Software cyber SEcuriTy
Software Assurance Security Issues
Joint Planning and Development Office “Where new ideas are welcome”
Internet of Things (IoT) for Industrial Development and Automation
Presentation transcript:

Emerging Technologies for Homeland Security John Stammreich Vice President - Homeland Security Boeing Phantom Works October 2004

“Hard choices must be made in allocating limited resources. The U.S. government should identify and evaluate the transportation assets that need to be protected, set risk- based priorities for defending them, select the most practical and cost-effective ways of doing so, and then develop a plan, budget, and funding to implement the effort. The plan should assign roles and missions to the relevant authorities (federal, state, regional, and local) and to private stakeholders. In measuring effectiveness, perfection is unattainable. But terrorists should perceive that potential targets are defended. They may be deterred by a significant chance of failure." 9/11 Commission Recommendation

Needed Focus Balanced, Sensible Approach You can’t do everything or build a “perfect net” Focus on balancing effectiveness and affordability Responses should not cause more harm than the attack Low hanging fruit may have unintended consequences Proactive vs Reactive Detect early Quick, coordinated, decisive action Contain the threat as far away as possible Emphasize Deterrence vs Response Actively deter threat rather than wait for it Understand what influences and deters the enemy Requires collaboration and integration of information and resources Requires collaboration and integration of information and resources

LowHigh Low High Payoff (Symbolic + Economic + Coercive Value Factors) Downside Threat is discouraged Incentivized Threat Deterrence View ( Cost + Difficulty + Backlash ) Reduce Impact: Detect Prevent Localize Mitigate Contain Reassure Create Uncertainty: Intelligence, Sensors, Interdiction, Forensics, Attribution, Retribution

Automated cognitive knowledge management Interoperability of new & legacy systems Networked broadband communications Visualization software highlights key information Effectiveness of the net increases with number of sensors (Metcalf’s law) Network Centric Operations Information access and knowledge management allows decision making to move from reactive to proactive Information access and knowledge management allows decision making to move from reactive to proactive “Getting the right information to right elements at the right time”

NCO Enabling Technologies & Origins Web portal/ data access User customized windows/displays Publish/ subscribe infosphere Interactive database access Database driven displays Variable message format Information security/ encryption Role-based access Multi-level security Collaborative chat Fast contextual search Data mining/data correlation engines M&S-based Decision aids Interoperable communications Ad hoc mobile networks Demand-based comm bandwidth CommercialMilitaryTechnologies XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXX

Leveraging Commercial Information Technology Spiral evolution of existing nets is underway Ad hoc systems currently used to navigate around existing stovepipes Normal requirements/modeling/development chain bypassed JWID ’04 case study, Combatant Commands as early adopters Enhanced data mining / Information Management running commercial industry The future: Swarming nets keep growing Threat Correlation, Cognitive Knowledge Management / Decision Aids migrating from commercial industry Natural Selection - Biological vs traditional DoD model Commercial forces & practices will dominate NCO

Implications for Homeland Security Understanding the nature of the threat and deterrence are key to affordability. The search for the “holy grail” silver bullet sensor is giving way to layered sensors. Greatest payoff will be in the area of automated cognitive information systems which can share and collaborate. New HLS capabilities will come from technology push rather than requirements pull. Improvements in information management and collaboration will come from the commercial world at their own pace. Collaborative capabilities swarming nets and mobil ad hoc communications will spontaneously break through organizational or cultural barriers.

Policy Implications Complementary advances are being made in both Commercial and DoD networked worlds and they are bootstrapping each other. To achieve the situational and domain awareness necessary to contain terrorism, we need to take advantage of the natural dynamic of the networked world. The current top down, scripted architecture driven R&D development cycle is an artificial overlay on net development. Spiral evolution, infused with technology breakthroughs, is synergistic to the natural evolution of the net. The Net Generation and the net entities they spawn will collaborate regardless of structure to achieve success The Net Generation and the net entities they spawn will collaborate regardless of structure to achieve success