Presentation is loading. Please wait.

Presentation is loading. Please wait.

NMIOTC Conference June 2012 Mr. Michael “Monty” Montgomery

Similar presentations


Presentation on theme: "NMIOTC Conference June 2012 Mr. Michael “Monty” Montgomery"— Presentation transcript:

1 NMIOTC Conference 26-28 June 2012 Mr. Michael “Monty” Montgomery
United States Central Command Joint Security Office Force Protection Division Technology Branch

2 CENTCOM Maritime Operations
Combined Maritime Forces (CMF) CTF 150 Counter-Terrorism (CT); Maritime Security CTF 151 Counter-Piracy (CP) CTF 152 Gulf Maritime Security The 26 nations that comprise CMF are not bound by either a political or military mandate CMF is a flexible organization Vice Adm. John Miller relieved Vice Adm. Mark Fox as commander, U.S. Naval Forces Central Command/Fifth Fleet/Combined Maritime Forces May CMF consists of 26 nations – all volunteer and provide whatever service they can Flexible – because members can come and go as they desire and provide help in any way they desire

3 CTF -151 Counter-Piracy CJTF 151 operates out of the Horn of Africa to combat piracy and as of 2009 operates under USCENTCOM…not USAFRICOM CTF-151′s mission is to disrupt piracy and armed robbery at sea and to engage with regional and other partners to build capacity and improve relevant capabilities in order to protect global maritime commerce and secure freedom of navigation. 18 Jun 12 Korea took Command (Rotational) This building capacity and capabilities mission statement is where CENTCOM believes C3PO can help improve the sharing of MIO data and specifically the biometric collect, match and response can aid in the positive Identification and prosecution or tracking of pirates.

4 Partner Nation Benefits
Advance the rule of law through; consistent, reliable and defendable law enforcement techniques, support to criminal intelligence and civil unrest Support to Ministry of Defense or Ministry of Interior with external or internal security investigations Improved Regional Security through information sharing on land and at sea Improve border and port of entry control, capture wanted persons, identification of drug smugglers and illegal weapons trafficking 4

5 CENTCOM ID Ops Requirements
Near-real time response to the warfighter on the objective To include latent queries Warfighter accessible training Virtual-Based Training (VBT) Institutionalized Pre-deployment and theater Institutionalize critical Forensic programs and capabilities to ensure continued support to the warfighter Scalable; modular, expeditionary (e.g. EFL, ACME, EAC) Responsive, agile, multi-tiered Near-real time response to the warfighter on the objective To include latent queries Warfighter accessible training Virtual-Based Training (VBT) Institutionalized –service specific skill identifiers and the ability to grow the expertise we now rely on contractors to provide at astronomical costs. Pre-deployment and theater – We must get this biometric training into the CTCs, the school houses, Maritime Training exercises and even in theater to ensure our Sailors and Marines are prepared, identified and placed in the right positions to allow for success. Institutionalize critical forensic programs and capabilities to ensure continued support to the warfighter Scalable; modular, expeditionary (e.g. EFL) Responsive, agile, multi-tiered (e.g. WIT, EFL, TEDAC) – Critical forensic skillsets are currently funded with Overseas Contingency Operations dollars and unless these capabilities are institutionalized quickly we stand to lose one of the most valuable assets we have in the fight against Piracy and terrorism.

6 Last Tactical Mile (LTM)
The ability to send and receive biometric data and contextual information to warfighters on/off the FOB/COP On board enrollment and matching Wirelessly transmit and receive at the handheld Local trusted database Match to latent prints Most current AFG WL Transmit watch list updates to handheld device Transmit to DoD ABIS Receive match and respond

7 LTM Success The LTM Hand-held reduced the time to enroll subjects from 20 minutes (HIIDE) to ~ 5 Minutes (SEEK II) The hand-held provided the capability to conduct on-the-spot checks against current watch lists wirelessly, removing burden of transportation back to FOB or COP to submit collections When NIPR network was available, warfighter received a majority of responses within 2-5 minutes (ATEC Report) Reported Times: 31.2% within 2 mins 42.5% within 2-5 mins 26.3% > 5 mins Bottom line on why you need a CFS forward is: Warfighter time requirements for response Comms from OCONUS to CONUS go down more frequently than Comms in AFG LTM total enrollments as of 17 May 2012, 4,563 enrollment From the 4,563 LTM enrollments x DoD WL Hits 165 x AFG WL Hits 89 x NCTC KST WL Hits 1 x DoD Tier 1 WL Hit 16 x AFG WL 2 Hits 10 x latent Hits to the CFS 5 of the 10 x latent Hits not on any WL 2 of the 5 x latent Hits were detain on site, 3 of the enrollments the unit did not transmit, enrollment, it was downloaded during new build being place on the SEEK The other 1 enrollment was from a unit with out a mobile node to transmit the enrollment Detained or identified over 220 total WL hits~5K enrollments…as of Jun 2012 5x latent not on any current WL x KST at NCTC 1x DoD Tier 1 WL, 16 AFG WL level 2’s x AFG BEWL

8 Maritime Last Tactical Mile
NAVCENT Requirements Maritime Last Tactical Mile Near-real time biometric and forensic collect, match and response capabilities from a forward server located at NAVCENT to support Counter-Piracy, Maritime Interdiction and other base operations Provide a wireless match response from a biometric enabled watch list and unresolved latent fingerprint database in less than 5 minutes to end user

9 C3PO OV-1 Operational Overview

10 Maritime Last Tactical Mile / C3PO
JIEDDO funding Triple redundancy collect, match, response architecture Handheld DoD Watchlist Tier 1 and 2 Local watchlist Biometric Forward matching server CMF/CTF/NAVCENT Watchlist Latent prints DoD Automated Biometric Identification System (ABIS) Intel analysis support Triple redundancy collect, match, response architecture Uses current robust Comm/CENTRIX architecture back to the Combined Intelligence Fusion Center (CIFC) / CMF Watch / NAVCENT Could use SOF portal architecture (BGAN Sat or with current on board unclassified internet access) Currently discussing 3G/4G capabilities for future (concerns currently with this because of the need for LOS) Combined Intelligence Fusion Center (CIFC) / CMF Watch

11 Questions


Download ppt "NMIOTC Conference June 2012 Mr. Michael “Monty” Montgomery"

Similar presentations


Ads by Google