1 / 24

Boston – June 12 th

Boston – June 12 th. “Clear and Present Danger”. Joe Rozek Microsoft Corporation. Sun Tzu: “The Art of War”. Know the enemy and know yourself; in a hundred battles you will never be in peril When you are ignorant of the enemy but know yourself, your chances of winning and losing are equal

ethel
Download Presentation

Boston – June 12 th

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Boston – June 12th

  2. “Clear and Present Danger” Joe Rozek Microsoft Corporation

  3. Sun Tzu: “The Art of War” • Know the enemy and know yourself; in a hundred battles you will never be in peril • When you are ignorant of the enemy but know yourself, your chances of winning and losing are equal • If you are ignorant both of your enemy and yourself, you are certain in every battle to be in peril

  4. ???

  5. “Insurgency” “a condition of revolt against a government that is less than an organized revolution and that is not recognized as belligerency”

  6. “Terrorism” “The calculated use of violence or the threat of violence to inculcate fear - - intended to coerce or to intimidate governments or societies in the pursuit of the terrorist’s goals that are generally political, religious or ideological”

  7. Unconventional Warfare • Organization - Underground *** - Auxiliary ● Witting ● Unwitting • Operators • Cell Structure • Tradecraft

  8. Cell Structure

  9. Fusion Centers

  10. Definition A collaborative multi-disciplinary public safety and private sector real or virtual organization where information is collected, integrated, evaluated, analyzed, and disseminated to support efforts to anticipate, identify, prevent, monitor and respond to criminal and terrorist activity Turning information into intelligence and actionable knowledge

  11. Agriculture, food, water, the environment Banking and finance Chemical Industry, hazardous materials Criminal Justice Education Emergency services Energy Government Health and Public Health Hospitality and lodging Information, telecom Military Postal and shipping Private security Public works Real estate Retail Social services Transportation Functional Categories

  12. Key Guidelines • Create a collaborative environment for the sharing of intelligence and information among local, state, tribal, and federal law enforcement agencies, public safety agencies and private sector • Leverage the databases and systems available via participating entities to maximize information sharing • Create an environment in which participants seamlessly communicate by leveraging existing systems and those under development and allow for future connectivity to other local, state, tribal and federal systems – Global Justice Extensible Markup Language (XML) • Integrate technology, systems, and people • Ensure appropriate security measures are in place for the facility, data and personnel

  13. Assumptions • Multi-use: crime, terrorism, all hazards • The essence of prevention and response: • State and local responders • Information sharing • Information sharing will either be evolutionary or revolutionary

  14. Facts • Direct response to intelligence and information sharing failures – 9/11, London, Saudi Oil Co. • NGA - Second highest priority • 41+ state and local sites in operation today • No technology standard or best practices are in place

  15. Facts Contd. • Funding available through DHS and COP grant programs • Constituencies • 535 Congressmen/women & Senators • 50 States, plus territories and protectorates • Counties and municipalities

  16. Fusion: Today??? Information Public Safety, Private Sector, Citizens Intelligence Law Enforcement EOC Emergency Management

  17. Fusion: Future Prevention Information Public Safety, Private Sector, Citizens Intelligence Law Enforcement COP EOC Emergency Management Preparation Preparation Response

  18. Project Imperatives • Public – Private Sector Alliance • KISS Principle • Understand the business process requirements • Understand the technology components that are necessary to support the business processes

  19. Project Imperatives (Contd.) • Approach that will allow a State to build out its IT framework incrementally • Integrated approach • Service Oriented Architecture • Senior Decision Maker Conceptual Architecture • CIO IT Architecture

  20. Discussion Points • Foundation of the President’s Information Sharing Environment Implementation Plan • Re-programming FY-07 funds • Programmed FY-08 funds • Priority for governors • State led • Long term effort

  21. Risk • Financial Risk – Minimal • Public Safety Risk – Catastrophic • Tyranny of time

  22. Message • Time is not our ally • Our Country remains vulnerable • Its not if . . . but when the homeland will be attacked . . . again • Need to prepare now not later

  23. Questions

  24. © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

More Related