Download presentation
Presentation is loading. Please wait.
Published byMarylou Bradley Modified over 8 years ago
1
Boston – June 12 th
2
2 Joe Rozek Microsoft Corporation
3
Know the enemy and know yourself; in a hundred battles you will never be in peril When you are ignorant of the enemy but know yourself, your chances of winning and losing are equal If you are ignorant both of your enemy and yourself, you are certain in every battle to be in peril 3
4
4
5
“a condition of revolt against a government that is less than an organized revolution and that is not recognized as belligerency” 5
6
“The calculated use of violence or the threat of violence to inculcate fear - - intended to coerce or to intimidate governments or societies in the pursuit of the terrorist’s goals that are generally political, religious or ideological” 6
7
7 Organization - Underground *** - Auxiliary ● Witting ● Unwitting Operators Cell Structure Tradecraft
8
8
9
9
10
10 A collaborative multi-disciplinary public safety and private sector real or virtual organization where information is collected, integrated, evaluated, analyzed, and disseminated to support efforts to anticipate, identify, prevent, monitor and respond to criminal and terrorist activity Turning information into intelligence and actionable knowledge
11
11 Agriculture, food, water, the environment Banking and finance Chemical Industry, hazardous materials Criminal Justice Education Emergency services Energy Government Health and Public Health Hospitality and lodging Information, telecom Military Postal and shipping Private security Public works Real estate Retail Social services Transportation
12
12 Create a collaborative environment for the sharing of intelligence and information among local, state, tribal, and federal law enforcement agencies, public safety agencies and private sector Leverage the databases and systems available via participating entities to maximize information sharing Create an environment in which participants seamlessly communicate by leveraging existing systems and those under development and allow for future connectivity to other local, state, tribal and federal systems – Global Justice Extensible Markup Language (XML) Integrate technology, systems, and people Ensure appropriate security measures are in place for the facility, data and personnel
13
13 Multi-use: crime, terrorism, all hazards The essence of prevention and response: State and local responders Information sharing Information sharing will either be evolutionary or revolutionary
14
14 Direct response to intelligence and information sharing failures – 9/11, London, Saudi Oil Co. NGA - Second highest priority 41+ state and local sites in operation today No technology standard or best practices are in place
15
15 Funding available through DHS and COP grant programs Constituencies 535 Congressmen/women & Senators 50 States, plus territories and protectorates Counties and municipalities
16
16 Intelligence Law Enforcement Information Public Safety, Private Sector, Citizens EOC Emergency Management
17
17 Intelligence Law Enforcement Information Public Safety, Private Sector, Citizens EOC Emergency Management Preparation Preparation COP Response Prevention
18
Public – Private Sector Alliance KISS Principle Understand the business process requirements Understand the technology components that are necessary to support the business processes 18
19
Approach that will allow a State to build out its IT framework incrementally Integrated approach Service Oriented Architecture Senior Decision Maker Conceptual Architecture CIO IT Architecture 19
20
20 Foundation of the President’s Information Sharing Environment Implementation Plan Re-programming FY-07 funds Programmed FY-08 funds Priority for governors State led Long term effort
21
21 Financial Risk – Minimal Public Safety Risk – Catastrophic Tyranny of time
22
22 Time is not our ally Our Country remains vulnerable Its not if... but when the homeland will be attacked... again Need to prepare now not later
23
23
24
© 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.