Developing Algorithms and Software Assistants for Security Domains

Size: px
Start display at page:

Download "Developing Algorithms and Software Assistants for Security Domains"

Transcription

1 CREATE Research Archive Research Project Summaries 2012 Developing Algorithms and Software Assistants for Security Domains Milind Tambe University of Southern California, Follow this and additional works at: Part of the Risk Analysis Commons Recommended Citation Tambe, Milind, "Developing Algorithms and Software Assistants for Security Domains" (2012). Research Project Summaries. Paper This Article is brought to you for free and open access by CREATE Research Archive. It has been accepted for inclusion in Research Project Summaries by an authorized administrator of CREATE Research Archive. For more information, please contact

2 National Center for Risk and Economic Analysis of Terrorism Events University of Southern California Los Angeles, California Developing Algorithms and Software Assistants for Security Domains October 2011 to September 2012 Milind Tambe University of Southern California "This research was supported by the United States Department of Homeland Security through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under Cooperative Agreement 2007-ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security or the University of Southern California." Cooperative Agreement No ST-061-RE0001 Department of Homeland Security December 31, 2012

3 ABOUT CREATE The National Center for Risk and Economic Analysis of Terrorism Events (CREATE) was the first university-based Center of Excellence (COE) funded by University Programs of the Science and Technology (S&T) Directorate of the Department of Homeland Security (DHS). CREATE started operations in March of This annual report covers the eighth year of CREATE funding from October 2011 to September 2012, the second year under Cooperative Agreement 2010-ST-061-RE0001 from DHS. While the text of this report focuses on the eighth year, all data tables, publications, lists of participants, students, and presentations and events are cumulative from the inception of CREATE. CREATE s research mission is to develop advanced models and tools for risk assessment, economic assessment, and risk management to counter terrorism. CREATE accomplishes this mission through an integrated program of research, education, and outreach, spanning the disciplines of economics, psychology, political science, industrial and systems engineering and information science. CREATE develops models, analytical tools, methodologies and software, and tests these tools in case analyses, representing critical homeland security investment and policy decisions. Due to the cross-cutting nature of research in risk, economics, and risk management, CREATE serves the need of many client agencies at the DHS, including the Transportation Security Agency, Customs and Border Protection, Immigration and Customs Enforcement, FEMA and the US Coast Guard. In addition, CREATE has developed relationships with clients in the Offices of National Protection and Programs, Intelligence and Analysis, General Council, Health Affairs, and Domestic Nuclear Detection. Using a mix of fundamental and applied research, CREATE faculty and students take both the long-term view of how to reduce terrorism risk through fundamental research and the medium-term view of how to improve the cost-effectiveness of counter-terrorism policies and investments through applied research. Please visit for more information. Page 2 of 15

4 Developing Algorithms and Software Assistants for Security Domains Milind Tambe, University of Southern California 1. Executive Summary Research Accomplishments Applied Relevance: Real world Deployments Collaborative Projects Research Products Publications and Reports Presentations Software Tools and Products Education and Outreach Products Executive Summary This research has been at the forefront of applying computational game theory techniques for security. It has led to a wide range of actual deployed applications of game theory for security. Our first application, Assistant for Randomized Monitoring Over Routes (ARMOR), successfully deployed game theory in practice at the Los Angeles International Airport (LAX) in 2007, and has been in use since. In particular, ARMOR uses game theory to randomize allocation of police checkpoints and canine units. Our second application, Intelligent Randomization in Scheduling (IRIS), is in use by the US Federal Air Marshal Service since 2009 to deploy air marshals on US air carriers. A third application, Game-theoretic Unpredictable And Randomly Deployed Security (GUARDS), for the US Transportation Security Administration is getting evaluated for a national deployment across over 400 United States airports. A fourth application, Port Resilience Operational / Tactical Enforcement to Combat Terrorism (PROTECT), for the United States Coast Guard, has been demonstrated at the Ports of Boston and New York and is actually headed for nationwide deployment. A final application called TRUSTS (Tactical Randomization for Urban Security in Transit Systems) for checking for fare-evaders on LA area metro trains is currently being evaluated in field trials. We are also collaborating with the US Coast Guard on an application for deploying escort boats to protect ferries, which is currently under evaluation for deployment in late Many other agencies around the globe are now looking to deploy these techniques. These systems focus on the game-theoretic method of providing efficient randomization of security plans and processes. Casting the problem as a Bayesian Stackelberg game, they obtain randomized strategies for security agents; one of the fundamental advances in all these systems then is to provide the fastest algorithms known-to-date to solve such games. The strength of this research is the marriage of strong theoretical game-theoretic foundations with practical applications, and the virtuous cycle of theory and practice to benefit from each other. These deployments of applications in the real-world has led to significant interest from the media and other potential users/customers, and substantial research. Keywords related to the project: Keyword 1: Game Theory, Bayesian Stackelberg games Keyword 2: Security domains Keyword 3: Software scheduling assistants Page 3 of 15

5 2. Research Accomplishments At the heart of our applications are the efficient algorithms created to solve the very large games to provide optimal strategies for the defender in the Stackelberg games that are deployed. This challenge of fast Stackelberg game solvers is the primary research challenge we have addressed to this point, but this remains a daunting challenge. Furthermore, the presence of uncertainty and human biases further complicate the problem. These algorithms combine computational techniques from Computer Science with the insights from Operations Research literature, and thus are at the cutting edge of both these fields. The advances reported here were necessary for the deployed application; list of key publications is available in the appendix. Figure 1 US Coast Guard Boat patrol, scheduled by PROTECT, on patrol in the port of Boston. Figure 2 IRIS schedules air marshals on board commercial planes. Algorithms For Efficient Scalable Algorithms Scale-up challenges arise in these games due to at least three different reasons: 1. Growth in the number of defender strategies: There may be a very large number of ways in which the limited defender resources may be allocated to targets. For example, in the IRIS system, with just 100 flights, and 10 air marshals, we have 100, i.e different ways of allocating air marshals to flights. 2. Growth in the number of attacker strategies: The growth in attacker strategies may arise because the attacker may have multiple different ways of evading defender actions and then attack particular targets. This explosion of attacker strategies is seen to arise in the GUARDS system. Indeed, such growth in attacker strategies is also seen in other applications where the defender s actions involve protecting targets embedded in a network, e.g. protecting important locations in a city that are embedded in the city s road network. In such situations, the attacker can follow many different paths to get to the targets of interest. 3. Growth in the number of attacker types: The security forces may be facing many types of attackers. For example, the LAX police need to protect the airport not only from terrorists but also from local LA gangs and even disgruntled employees. When there is an increase in the number of these attacker types, each attacker type increases the computational complexity by an exponential factor. To address these complexities, we have created a range of different algorithms described in the table below. The first game-theoretic algorithms were designed in 2007, and newer algorithms continue to be designed to address on-going challenges. Further improvements are required, and we anticipate that newer algorithms providing additional speedup techniques will continue to emerge. C 10 Page 4 of 15

6 Example Scale-up: Defender Scale-up: Attacker Scale-up: Algorithm Solution Type Domain Actions Actions Attacker Types (Year) LAX Low Low Medium Approximate ASAP (2007) LAX Low Low Medium Exact DOBSS (2007) FAMS High Low Low Approximate ORIGAMI (2009) FAMS High Low Low Approximate ERASER-C (2009) FAMS High Low Low Exact ASPEN (2010) Urban RANGER High High Low Approximate Security (2010) Urban RUGGED High High Low Exact Security (2011) LAX Low Low High Exact HBGS (2011) FAMS High Low High Exact HBSA (2011) FAMS High Low High Exact HUNTER (2012) LA Metro High Low High Approximate TRUSTS (2012) Social Network High High Low Approximate LSMI (2012) Table 1 List of Algorithms Addressing Scalability in Real-world Security Domains (Most recent work in green) Algorithms for Robust Algorithms and Handling Human Biases Real-world domains present different sorts of uncertainties: there are uncertainties in the preferences of the attackers (Bayesian Games); in their abilities to compute (bounded rationality) and whether human biases affect their decision making. We have developed algorithms geared to handle such uncertainties of the real-world, and plan to continue to develop even more robust algorithms in the future. Example Domain Addressed Issue Algorithm (Year) LAX Rationality / Robustness in Attacker s Observations COBRA (2009) LAX Attacker Preferences (Bayesian Games) HBGS (2011) FAMS Attacker Preferences (Bayesian Games) HBSA (2011) TSA Activities Attacker Capability (attacker circumvents security measures) GUARDS (2011) FAMS Attacker Preferences (Bayesian Games) HUNTER (2012) FAMS Attacker Preferences (Multiobjective) ORIGAMI-A (2012) USCG Attaker s bounded rationality (Quantal Response) PASAQ (2012) FAMS Attacker s bounded rationality (robust optimization) MATCH (2012) Table 2 List of Algorithms Addressing Robustness Issues in Real-world Security Domains (Most recent work in green) Evaluation with Human Subjects We have also evaluated the performance of our algorithms against human subjects. We developed a Pirates and Treasure game modeling the real-security problem at LAX, and compare different Page 5 of 15

7 approaches, involving 158 human subjects playing 3160 instances of the games in total. The final conclusion was that a model that incorporates both the ideas of robustness and human behavior achieves statistically significant better rewards and also maintains equivalent or faster solution speeds compared to existing approaches. Figure 3 A Screenshot of the "Pirates and Treasure" Game Modeling the Security Problem at LAX. Evaluation of Computational Emotional Contagion Models We have created agent simulations that include three separate phenomena: spread of knowledge, emotional contagion, and social comparison. We have also examined different models of contagion and their applicability to simulating emotional contagion. Recent work has sought to quantify the qualitative findings of social psychology into useable models, primarily drawing from two bodies of research on similar phenomena. We incorporated social and emotional contagion effects and first applied it to an evacuation simulation domain. Applied to real world data from video obtained from panic situations in Amsterdam and Greece, our results show that our models with emotional contagion were able to replicate real behavior with higher fidelity than the established models. 3. Applied Relevance: Real world Deployments Real-world applications are the result of a unique collaboration where university researchers work directly with a security agency for the purpose of creating a useful product to potentially deploy outcomes of research on a national scale. These collaborations to transition research to large-scale real-world deployments have presented valuable lessons. They have taught us how to bridge the culture gap between academic researchers and real-world operators. This section briefly describes our different applications. 3.1 ARMOR Our first application of security games was ARMOR (Assistant for Randomized Monitoring Over Routes). This application emerged in 2007 after police at the Los Angeles International Airport (LAX) approached us with the question of how to randomize deployment of their limited security resources. For example, they have six inbound roads into LAX, and they wished to set up checkpoints. There are not enough police to set up checkpoints on all roads at all times. So the question is where and when to set up these checkpoints. Similarly, they have eight terminals but not enough explosive-detecting canine units to Page 6 of 15

8 patrol all terminals at all times of the day (a canine unit is limited by the number of hours a dog can work per day). Given that LAX may be under surveillance by adversaries, the question is where and when to have the canine units patrol the different terminals. The police approached us in April 2007 after we had designed our first set of algorithms. While the algorithms were ready, we needed to spend several months acquiring knowledge, understanding how different police units performed their duties, constraints on their operations in terms of shifts of operations, obtaining detailed data on passenger loads at different times of the day at different terminals and so on. The passenger data, for example, influences how payoffs are determined in our underlying game representation --- our adversaries would want to cause maximum harm to civilians and the higher the passenger load, the higher the payoff to the adversaries. By August of 2007, after multiple iterations, the police started using ARMOR for setting up checkpoints and later for canine patrols. The backbone of ARMOR are algorithms for solving Bayesian Stackelberg games as discussed in the following; they recommend a randomized pattern for setting up checkpoints and canine unit patrols. Police provide inputs like the number of available canine units; ARMOR then provides to the police an hour-by-hour schedule for where to set up canine patrols. ARMOR continues to be in use at LAX since 2007 and has undergone periodic updates to its software. The ARMOR system has received numerous accolades for its use. 3.2 IRIS After ARMOR, we were contacted by the Federal Air Marshals Service (FAMS). Their challenge is to randomize allocations of air marshals to flights to avoid predictability by adversaries conducting surveillance (e.g. these might be part of an insider threat), yet provide adequate protection to more important flights. We are focused in particular on some sectors of international flights. Even within that domain, there are a very large number of flights over a month, and not enough air marshals to cover all the flights. To accomplish the goal of randomized allocation of air marshals to flight, we constructed a system called IRIS (Intelligent Randomization In Scheduling). We delivered the system to the FAMS in Spring After extensive testing, the FAMS started using this system in October At its backend, IRIS casts the problem it solves as a Stackelberg game and in particular as a security game. We have focused in particular on the special nature of the security game framework to build fast algorithms for IRIS. 3.3 GUARDS After IRIS, our next focus was GUARDS. GUARDS (Game-theoretic Unpredictable and Randomly Deployed Security) was developed in collaboration with the United States Transportation Security Administration (TSA) to assist in resource allocation tasks for airport protection at over four hundred United States airports. In contrast with ARMOR and IRIS, which focus on one installation/applications and one security activity (e.g. canine patrol or checkpoints) per application, GUARDS reasons with multiple security activities, diverse potential threats and also hundreds of end users. The goal for GUARDS is to allocate TSA personnel to security activities conducted to protect the airport infrastructure; GUARDS does not focus on checking passengers. Page 7 of 15

9 GUARDS again utilizes a Stackelberg game, but generalizes beyond security games and develops a novel solution algorithm for these games. GUARDS has been delivered to the TSA and is currently under evaluation and testing for scheduling practices at an undisclosed airport. If successful, the TSA intends to incorporate the system into their unpredictable scheduling practices nationwide. 3.4 PROTECT Beyond ARMOR, IRIS and GUARDS, more recently, we have developed a game-theoretic system that is deployed by the United States Coast Guard (USCG) in the port of Boston for scheduling their patrols. The system is called PROTECT (Port Resilience Operational / Tactical Enforcement to Combat Terrorism). The USCG s mission includes maritime security of the US coasts, ports, and inland waterways; a security domain that faces increased risks in the context of threats such as terrorism and drug trafficking. Given a particular port and the variety of critical infrastructure that an adversary may attack within the port, USCG conducts patrols to protect this infrastructure; however, while the adversary has the opportunity to observe patrol patterns, limited security resources imply that USCG patrols cannot be at every location 24/7. To assist the USCG in allocating its patrolling resources, PROTECT uses an attacker-defender Stackelberg game framework, with USCG as the defender against terrorist adversaries that conduct surveillance before potentially launching an attack. PROTECT s solution is to typically provide a mixed strategy, i.e. randomized patrol patterns taking into account the importance of different targets, and the adversary s surveillance and anticipated reaction to USCG patrols. USCG has termed the deployment of PROTECT in Boston a success, and efforts are underway to test it in the port of New York, with the potential for nationwide deployment. Since February 2012, USCG has been testing patrols provided by PROTECT in the port of New York. The patrols generated by PROTECT for the USCG incorporate multiple defender patrol boats along with scheduling various defender activities to be performed at the different critical infrastructure. We are planning to incorporate various defender types, such as aerial vehicles, to assist in the patrolling schedules, along with Other Government Agencies (OGAs) in generating a patrol schedule that integrates all these aspects in a single system. 3.5 TRUSTS 1. Figure 4 PROTECT is being used in Boston. Figure 5 Extending PROTECT to NY. Building on the success of the previous projects, TRUSTS (Tactical Randomization for Urban Security in Transit Systems) was developed for fare-evasion deterrence in urban transit systems, carried out in collaboration with the Los Angeles Sheriffs Department (LASD). In many urban transit networks Page 8 of 15

10 including the LA Metro subway system, there are no ticket-checking gates at the stations. In proof-ofpayment transit systems, passengers are legally required to purchase tickets before entering but are not physically forced to do so. Instead, patrol units move about the transit system, inspecting the tickets of passengers, who face fines if caught fare evading. With approximately 80,000 riders using the LA Metro subway system daily, fare evasion can potentially lead to large amount of revenue loss. The LASD deploys patrol units on board trains and at stations for fare-checking and crime-prevention. Our goal is to design randomized patrol strategies that efficiently utilize limited resources to deter fare-evasion. The deterrence of such fines depends on the unpredictability and effectiveness of the patrols. TRUSTS models the problem of computing patrol strategies as a leader-follower Stackelberg game where the objective is to deter fare evasion and hence maximize revenue. This problem differs from previously studied Stackelberg settings in that the leader strategies must satisfy massive temporal and spatial constraints; moreover, unlike in these counterterrorism-motivated Stackelberg applications, a large fraction of the ridership might realistically consider fare evasion, and so the number of followers is potentially huge. 3.6 Beyond ARMOR/IRIS/GUARDS/PROTECT/TRUSTS There are many other security agencies in the United States and beyond that have expressed an interest in using the Stackelberg game model for improving their operations. One application might be protecting important locations in a city by setting up randomized checkpoints throughout the city, e.g following the devastating attacks in November 2008, Police in Mumbai set up randomized checkpoints throughout the road networks in the city to try to protect the city. Furthermore, while counter-terrorism has remained a key focus of the work so far, the new projects are now extending the application arena to include crime suppression and other objectives. For example, one such application might be improved distribution of patrols throughout forests in order to effectively limit extraction from illegal extractors; yet another one might be randomized checking to support food distribution networks of charity organizations. Other such applications are being discussed. 4 Collaborative Projects From the very beginning, all of our projects, ARMOR, IRIS, GUARDS, PROTECT, and TRUSTS, required extensive collaboration with security agencies. Indeed, we have deployed the ARMOR- Checkpoints and ARMOR-K9 in collaboration with the Los Angeles World Airport (LAWA) police. We have had a close collaboration with Federal Air Marshals (FAMs) for IRIS, with the TSA for GUARDS, the Coast Guard for PROTECT, and the Los Angeles Sheriffs Department for TRUSTS. For PROTECT, we have continued to visit United States Coast Guard headquarters, and hosted their visits to USC. 5 Research Products Research Products (Please detail below) # 5a # of peer-reviewed journal reports published 11 5a # of peer-reviewed journal reports accepted for publication 5a # of non-peer reviewed publications and reports 5a # of scholarly journal citations of published reports >350 5b # of scholarly presentations (conferences, workshops, seminars) 5b # of outreach presentations (non-technical groups, general public) 5c # of products delivered to DHS, other Federal agencies, or State/Local 4 Page 9 of 15

11 Research Area Referred Not Referred PDF Available for DHS 5c # of patents filed 2 5c # of patents issued 5c # of products in commercialization pipeline (products not yet to market) 5c # of products introduced to market 5.1 Publications and Reports CREATE PUBLICATIONS 1. E. Shieh, R. Yang, B. An, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, G. Meyer PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS)(Innovative applications track), Best Paper Award, Innovative Applications, June Z. Yin, A. Jiang, M.P. Johnson, M. Tambe, C. Kiekintveld, J.P. Sullivan, T. Sandholm, K. LeytonBrown TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems In Proceedings of the Conference on Innovative Applications of Artificial Intelligence (IAAI), July B. An, E. Shieh, C. Kiekintveld, Y. Vorobeychik, D. Kempe, S. Singh, M. Tambe Security Games with Limited Surveillance In Proceedings of the Conference on Artificial Intelligence (AAAI), July J. Tsai, T. Nguyen, M. Tambe Security Games for Controlling Contagion In Proceedings of the Conference on Artificial Intelligence (AAAI), July M. Jain, K. Leyton-Brown, M. Tambe The Deployment to Saturation Ratio in Security Games In Proceedings of the Conference on Artificial Intelligence (AAAI), July E. Shieh, R. Yang, B. An, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, G. Meyer PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States In Proceedings of the conference on Artificial Intelligence (AAAI) (Spotlight track), July J. Pita, R. Maheswaran, M. Tambe, S. Kraus A Robust Approach to Addressing Human Adversaries in Security Games In Proceedings of the European Conference on Artificial Intelligence (ECAI), August J. Tsai, E. Bowring, S. Marsella, W. Wood, M. Tambe Emotional Contagion with Virtual Characters In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), June J. Pita, R. John, R. Yang, R. Maheswaran, S. Kraus, M. Tambe A Robust Approach to Addressing Human Adversaries in Security Games In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), June J. Tsai, E. Bowring, S. Marsella, W. Wood, M. Tambe A Study of Emotional Contagion with Virtual Characters In Proceedings of the International Conference on Intelligent Virtual Agents (IVA), September RM x X RM x X RM x X RM x X RM x X RM x X RM x x RM x x RM x x RM x x 11. M. Tambe, M. Jain, J. Pita, A. Jiang Game Theory for Security: Key RM x Page 10 of 15

12 Research Area Referred Not Referred PDF Available for DHS CREATE PUBLICATIONS Algorithmic Principles, Deployed Systems, Lessons Learned 50th Annual Allerton Conference on Communication, Control, and Computing, Presentations 1. E. Shieh, R. Yang, B. An, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, G. Meyer PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS)(Innovative applications track), Best Paper Award, Innovative Applications, June Z. Yin, A. Jiang, M.P. Johnson, M. Tambe, C. Kiekintveld, J.P. Sullivan, T. Sandholm, K. LeytonBrown TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems In Proceedings of the Conference on Innovative Applications of Artificial Intelligence (IAAI), July B. An, E. Shieh, C. Kiekintveld, Y. Vorobeychik, D. Kempe, S. Singh, M. Tambe Security Games with Limited Surveillance In Proceedings of the Conference on Artificial Intelligence (AAAI), July J. Tsai, T. Nguyen, M. Tambe Security Games for Controlling Contagion In Proceedings of the Conference on Artificial Intelligence (AAAI), July M. Jain, K. Leyton-Brown, M. Tambe The Deployment to Saturation Ratio in Security Games In Proceedings of the Conference on Artificial Intelligence (AAAI), July E. Shieh, R. Yang, B. An, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, G. Meyer PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States In Proceedings of the conference on Artificial Intelligence (AAAI) (Spotlight track), July J. Pita, R. Maheswaran, M. Tambe, S. Kraus A Robust Approach to Addressing Human Adversaries in Security Games In Proceedings of the European Conference on Artificial Intelligence (ECAI), August M. Tambe Game theory for Security: Key Algorithmic Principles, Deployed Systems, Lessons Learned 2012 Conference on Homeland Security Modeling and Simulation (HLSMS12) 9. M. Tambe Game theory for Security: Key Algorithmic Principles, Deployed Systems, Lessons Learned Workshop on Safety, Security for Critical Infrastructure (SS4CI), Prague, M. Tambe Game theory for Security: Key Algorithmic Principles, Deployed Systems, Lessons Learned Workshop on Games, Networks and Markets, Microsoft Research, Cambridge, UK 2012 Page 11 of 15

13 11. M. Tambe Game theory and Human Behavior: Challenges in Security AAMAS workshop on Human-Agent Interaction Design and Models, M. Tambe Game theory for security: A real-world challenge problem for multiagent systems and beyond AAAI Spring Symposium on AI, The Fundamental Social Aggregation Challenge, and the Autonomy of Hybrid Agent Groups, 2012 Page 12 of 15

14 5.3 Software Tools and Products The following softwares have been delivered; updates to the softwares continue to be made. SOFTWARE PRODUCTS Project Leader(s) Date Delivered Item Agency Receiving Product Agency POC Commercialization Status Tambe PROTECT Coast Guard Craig Baldwin delivered Tambe GUARDS TSA Erin Steigerwald delivered Tambe IRIS FAMS James Curren delivered; pipeline Tambe ARMOR LAWA Police Ernest Cruz delivered; pipeline Tambe ARMOR LAWA Police James Butts delivered; pipeline 6 Education Education Initiatives (Please detail below) # # of students supported (funded by CREATE) 5 # of students involved (funded by CREATE + any other programs) # of students graduated # of contacts with DHS, other Federal agencies, or State/Local (committees) # of existing courses modified with new material # of new courses developed # of new certificate programs developed # of new degree programs developed Education Activities Professional Development, Internship and Summer Research Opportunities for Students Deliberate Mentorship Activities of Students and Post-docs Interactions with K12 teachers and/or students Description Summer internship for You Zhou in helping with the IRIS project for FAMS. Weekly meetings and annual team-building retreat for PhD students and postdoctoral researchers. All students/postdoctoral researchers involved: Postdoctoral researchers: Bo An Albert Jiang Page 13 of 15

15 PhD students: Manish Jain James Pita Eric Shieh Jason Tsai Zhengyu Yin Master students: Parth Shah You Zhou 7 Outreach Membership in DHS Related Committees Testimonies o Testimony by Robert S. Bray, Assistant Administrator, T.S.A. before the United States House of Representatives, Transportation Security Subcommittee, Homeland Security Committee. February 15, 2012: Testimony by Robert S. Bray, Hill Visits Visits to/meetings with DHS on behalf of CREATE Visits to/meetings with Other Govt Agencies on behalf of CREATE Media Coverage o o o o Coast Guard Outlook Magazine, Aug 7, 2012: CREATE's ARMOR-PROTECT Featured in Coast Guard Outlook Magazine, Airport Technology Article, July 26, 2012: Game theory: introducing randomness to airport security, DefenseMediaNetwork Article, July 10, 2012: The Port Resiliency for Operational/Tactical Enforcement to Combat Terrorism Model, CREATE News Article, April 18, 2012: New Book "Security and Game Theory" by CREATE's Milind Tambe, Page 14 of 15

16 o Viterbi News Article, April 06, 2012: Viterbi-led Initiative in Game Theory and Human Behavior Crosses Multiple Disciplinary Lines, External Partnerships/Relationships Established Outreach Event Presentations and/or Attendance Events Organized or Hosted on behalf of CREATE o Game Theory for Security Tutorial. CREATE Seminar given by Milind Tambe, Albert Jiang, and Manish Jain. August New Marketing Materials (brochures, fact sheets, websites please share a copy) Seminars or Lectures (if videotaped, please provide video link) o Game Theory for Security Tutorial. CREATE Seminar given by Milind Tambe, Albert Jiang, and Manish Jain. August Page 15 of 15

Developing Algorithms and Software Assistants for Security Domains

Developing Algorithms and Software Assistants for Security Domains CREATE Research Archive Research Project Summaries 2010 Developing Algorithms and Software Assistants for Security Domains Milind Tambe University of Southern California, tambe@usc.edu Follow this and

More information

PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response

PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response Eric Shieh, Bo An, Rong Yang, Milind Tambe, Craig Baldwin, Joseph DiRenzo,

More information

Maritime Risk Symposium Public & Private Partnerships. Bethann Rooney The Port Authority of NY & NJ November 7, 2011

Maritime Risk Symposium Public & Private Partnerships. Bethann Rooney The Port Authority of NY & NJ November 7, 2011 Maritime Risk Symposium Public & Private Partnerships Bethann Rooney The Port Authority of NY & NJ November 7, 2011 The Port of New York & New Jersey First in overall risk Top 5 for overall commercial,

More information

Washington State Patrol

Washington State Patrol Washington State Patrol Vessel and Terminal Security Division Operations Briefing Presented to: AAPA Port Security Seminar July 19, 2006 For Official Use Only 1 Mission Statement: The Vessel and Terminal

More information

between the U.S. and the respective countries and 14 agreements on technical assistance and information sharing. Also of note in 2011, the Military Op

between the U.S. and the respective countries and 14 agreements on technical assistance and information sharing. Also of note in 2011, the Military Op Statement of Robert S. Bray Assistant Administrator Transportation Security Administration U.S. Department of Homeland Security Before the United States House of Representatives Transportation Security

More information

Chapter 17: Foreign Policy and National Defense Section 2

Chapter 17: Foreign Policy and National Defense Section 2 Chapter 17: Foreign Policy and National Defense Section 2 Objectives 1. Summarize the functions, components, and organization of the Department of Defense and the military departments. 2. Explain how the

More information

Federal Funding for Homeland Security. B Border and transportation security Encompasses airline

Federal Funding for Homeland Security. B Border and transportation security Encompasses airline CBO Federal Funding for Homeland Security A series of issue summaries from the Congressional Budget Office APRIL 30, 2004 The tragic events of September 11, 2001, have brought increased Congressional and

More information

Northern California Area Maritime Security Committee

Northern California Area Maritime Security Committee Northern California Area Maritime Security Committee 1. MISSION San Francisco Security Information White Paper The mission of this Area Maritime Security Committee is to help coordinate planning, information

More information

Global Annual Subway Ridership 1. Tokyo billion 2. Moscow billion 3. Seoul billion 4. New York City 1.

Global Annual Subway Ridership 1. Tokyo billion 2. Moscow billion 3. Seoul billion 4. New York City 1. Background New York City Subways and Buses is comprised of two agencies of the MTA regional transportation network MTA NYC Transit and MTA Bus. The regional network also includes MTA Staten Island Railway,

More information

MISSION STATEMENT THE SHIELD PROGRAM HANOVER CRIME TREND AWARENESS. Volume 1 / Issue 8 Monthly Newsletter January 12, 2017

MISSION STATEMENT THE SHIELD PROGRAM HANOVER CRIME TREND AWARENESS. Volume 1 / Issue 8 Monthly Newsletter January 12, 2017 Volume 1 / Issue 8 Monthly Newsletter January 12, 2017 MISSION STATEMENT Through community and multiagency partnerships: receive, analyze, and develop meaningful intelligence to counter crime and extremism

More information

Planning Terrorism Counteraction ANTITERRORISM

Planning Terrorism Counteraction ANTITERRORISM CHAPTER 18 Planning Terrorism Counteraction At Army installations worldwide, terrorism counteraction is being planned, practiced, assessed, updated, and carried out. Ideally, the total Army community helps

More information

North Carolina Information Sharing and Analysis Center NCISAAC

North Carolina Information Sharing and Analysis Center NCISAAC North Carolina Information Sharing and Analysis Center NCISAAC What is a Fusion Center? Following the terrorist attacks of September 11, 2001, our country was forced to take a critical look at the established

More information

William Switzer, III, pursuant to 28 U.S.C. 1746, declares as follows: 1. I am the Federal Security Director ("FSD") appointed by the Transportation

William Switzer, III, pursuant to 28 U.S.C. 1746, declares as follows: 1. I am the Federal Security Director (FSD) appointed by the Transportation UNITED STATES DISTRICT COURT DISTRICT OF COLUMBIA STEVEN BIERFELDT, ) ) Plaintiff, ) ) v. ) No. 09-cv-Ol117 ) JANET NAPOLITANO, as Secretary, ) Department of Homeland Security, ) ) Defendant. ) DECLARATION

More information

A Practical Dialogue on Concessions, Concessionaires, and Airport Security. November 1, 2006

A Practical Dialogue on Concessions, Concessionaires, and Airport Security. November 1, 2006 A Practical Dialogue on Concessions, Concessionaires, and Airport Security November 1, 2006 Today s s Rules of Engagement Public Dialogue Microphone Placement Questions, Comments, Challenges, Diatribes,

More information

City of Torrance Police Department

City of Torrance Police Department City of Torrance Police Department Testimony of John J. Neu Chief of Police Hearing on Radicalization, Information Sharing and Community Outreach: Protecting the Homeland from Homegrown Terror United States

More information

Jll'l. 1 ft-?! T-? I. U fe> II IlfiX IWA. «/Cx7. EEtn. _r. Eric Garcetti Mayor

Jll'l. 1 ft-?! T-? I. U fe> II IlfiX IWA. «/Cx7. EEtn. _r. Eric Garcetti Mayor Jll'l > M «iiic n n U fe> 1 ft- 1T111?! T-? I II IlfiX IWA ««/Cx7 O EEtn A _r. I m r IN \ Eric Garcetti Mayor September 21,2016 Honorable Members of the City Council c/o City Clerk Room 395, City Hall

More information

The Security War. AAPA Security Meeting Jul 18, Jay Grant, Director Port Security Council

The Security War. AAPA Security Meeting Jul 18, Jay Grant, Director Port Security Council The Security War AAPA Security Meeting Jul 18, 2007 Jay Grant, Director Port Security Council Port Security Council Mission + The Council brings public port authorities and commercial partners together

More information

LASD/Metro Transit Security Program

LASD/Metro Transit Security Program Los Angeles County Metropolitan Transportation Authority LASD/Metro Transit Security Program Board of Directors Meeting December 4, 2008 1 Metro s Proposed Security Model Contract Framework: FTE - based

More information

Homeland Security And Federal Law Enforcement Career Guide By Gould Editorial Staff READ ONLINE

Homeland Security And Federal Law Enforcement Career Guide By Gould Editorial Staff READ ONLINE Homeland Security And Federal Law Enforcement Career Guide By Gould Editorial Staff READ ONLINE If searched for a ebook by Gould Editorial Staff Homeland Security and Federal Law Enforcement Career Guide

More information

A Very Big Branch. We ve Got a Job to Do. Help From Many. Carrying Out Laws: Enforcement. Name: The Executive Branch

A Very Big Branch. We ve Got a Job to Do. Help From Many. Carrying Out Laws: Enforcement. Name: The Executive Branch We ve Got a Job to Do The job of the executive branch is to carry out the laws that the legislative branch passes. When you think of the executive branch, you probably think of the president. But the president

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Moreno, Antonio; Valls, Aïda; Bocio,

More information

AMERICAN ASSOCIATION OF PORT AUTHORITIES Duke Street Alexandria, VA Phone: (703) Fax: (703)

AMERICAN ASSOCIATION OF PORT AUTHORITIES Duke Street Alexandria, VA Phone: (703) Fax: (703) AMERICAN ASSOCIATION OF PORT AUTHORITIES 1010 Duke Street Alexandria, VA 22314 Phone: (703) 684-5700 Fax: (703) 684-6321 Kurt J. Nagle, President On behalf of the American Association of Port Authorities

More information

Modelling Missions of Light Forces

Modelling Missions of Light Forces Modelling Missions of Light Forces Karl A. Bertsche Defence and Civil Systems Domier GmbH Friedrichshafen Germany Postal Address: 88039 FriedrichshafedGermany E-mail address: bertsche.karl@domier.dasa.de

More information

Navy Expeditionary Combat Command Executing Navy s Maritime Strategy

Navy Expeditionary Combat Command Executing Navy s Maritime Strategy Navy Expeditionary Combat Command Executing Navy s Maritime Strategy RADM Mark Handley NDIA 15 th Annual Expeditionary Warfare Conference 6 OCT 2010 THIS BRIEF CLASSIFIED: UNCLASS Overview Riverine Maritime

More information

FOR OFFICIAL USE ONLY U.S. Department of Homeland Security Washington, DC 20528

FOR OFFICIAL USE ONLY U.S. Department of Homeland Security Washington, DC 20528 U.S. Department of Homeland Security Washington, DC 20528 FY 2006 Urban Areas Security Initiative (UASI) Award for the Las Vegas Area Las Vegas Area FY 2006 UASI Award $ 7,750,000 Risk: The Las Vegas Area

More information

DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002

DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002 DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002 Introduction This Reorganization Plan is submitted pursuant to Section 1502 of the Department of Homeland Security Act of 2002 ( the

More information

Strong. Secure. Engaged: Canada s New Defence Policy

Strong. Secure. Engaged: Canada s New Defence Policy Strong. Secure. Engaged: Canada s New Defence Policy Putting People First Long-term Capability Investments Spending Growth and Financial Transparency Bold New Vision 2 Putting People First People are the

More information

OPNET Drug Fund. Mission Statement: Functions: Long Term Goals: Page 1 of 5

OPNET Drug Fund. Mission Statement: Functions: Long Term Goals: Page 1 of 5 OPNET Drug Fund Mission Statement: The mission of the Olympic Peninsula Narcotics Enforcement Team is to target drug violators that have an impact on our communities and to reduce drug availability and

More information

Capital Offence June www orld.com.cbrnew

Capital Offence June www orld.com.cbrnew Major General Jeffrey Buchanan, commander Joint Force Headquarters, National Capital Region, (JFHQ NCR) tells Gwyn Winfield about preparing Washington DC for attack GW: What are JFHQNCR s roles in a CBRN

More information

OPNET Drug Fund. Mission Statement: Functions: Long Term Goals: Page 1 of 5

OPNET Drug Fund. Mission Statement: Functions: Long Term Goals: Page 1 of 5 OPNET Drug Fund Mission Statement: The mission of the Olympic Peninsula Narcotics Enforcement Team is to target drug violators that have an impact on our communities and to reduce drug availability and

More information

Introduction to Homeland Security Administration of Justice (ADJU 10AB) Course number

Introduction to Homeland Security Administration of Justice (ADJU 10AB) Course number Introduction to Homeland Security Administration of Justice (ADJU 10AB) Course number Fall Semester 2012 Instructor: Don Meredith Class Day/Time: Class Location: Required Text: Required Supplies: Tuesday,

More information

TECHNICAL SUPPORT WORKING GROUP. Perry Pederson Infrastructure Protection Subgroup

TECHNICAL SUPPORT WORKING GROUP. Perry Pederson Infrastructure Protection Subgroup TECHNICAL SUPPORT WORKING GROUP Perry Pederson Infrastructure Protection Subgroup TSWG Mission and Objectives Mission: Conduct interagency research and development programs for Combating Terrorism through

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 26 SEPTEMBER 2007 Operations EMERGENCY MANAGEMENT ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Publications and

More information

National Response Plan ESF #13 Public Safety and Security Annex & Terrorism Incident Law Enforcement and Investigation Annex

National Response Plan ESF #13 Public Safety and Security Annex & Terrorism Incident Law Enforcement and Investigation Annex National Response Plan ESF #13 Public Safety and Security Annex & Terrorism Incident Law Enforcement and Investigation Annex OSC Readiness Training November 18, 2004 ESF #13 Public Safety and Security

More information

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018 NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION SACT s remarks to UN ambassadors and military advisors from NATO countries New York City, 18 Apr 2018 Général d armée aérienne

More information

John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University.

John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University. John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University Testimony for the Senate Homeland Security Government Affairs Committee Hurricane Katrina:

More information

San Francisco Bay Area

San Francisco Bay Area San Francisco Bay Area PREVENTIVE RADIOLOGICAL AND NUCLEAR DETECTION REGIONAL PROGRAM STRATEGY Revision 0 DRAFT 20 October 2014 Please send any comments regarding this document to: Chemical, Biological,

More information

ABSTRACT INTRODUCTION

ABSTRACT INTRODUCTION Designing the Global Threat Reduction Initiative s Nuclear Security Education Program C. M. Marianno, W. S. Charlton, A. R. Contreras, K. Unlu, R. C. Lanza, G. E. Kohse ABSTRACT As part of the National

More information

UAV s And Homeland Defense Now More Critical Than Ever. LCDR Troy Beshears UAV Platform Manager United States Coast Guard

UAV s And Homeland Defense Now More Critical Than Ever. LCDR Troy Beshears UAV Platform Manager United States Coast Guard UAV s And Homeland Defense Now More Critical Than Ever LCDR Troy Beshears UAV Platform Manager United States Coast Guard Common Maritime Threats Counter- Terrorism Maritime Food Supply (Fish) Mass Migration

More information

Metro Transit Police Department Riders Advisory Council Meeting September 21, 2011

Metro Transit Police Department Riders Advisory Council Meeting September 21, 2011 Metro Transit Police Department Riders Advisory Council Meeting September 21, 2011 Chief Michael Taborn Metro Transit Police Department 1 Metro Transit Police Department MISSION The mission of the Metro

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction [National Security Presidential Directives -17] HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4 Unclassified version December 2002 Subject: National Strategy to Combat Weapons of Mass Destruction "The gravest

More information

DATE: OCTOBER 12, 2016 PAGE 2 OF 5 SUBJECT: RESOLUTION NO. - FY2016 FEDERAL PORT SECURITY GRANT PROGRAM, GRANT NO.

DATE: OCTOBER 12, 2016 PAGE 2 OF 5 SUBJECT: RESOLUTION NO. - FY2016 FEDERAL PORT SECURITY GRANT PROGRAM, GRANT NO. DATE: OCTOBER 12, 2016 PAGE 2 OF 5 4. Authorize the Harbor Department to implement the projects approved for funding by the DHS; and 5. Adopt Resolution No.. DISCUSSION: Background/Context: On February

More information

OFFICE OF THE CITY ADMINISTRATIVE OFFICER

OFFICE OF THE CITY ADMINISTRATIVE OFFICER REPORT from OFFICE OF THE CITY ADMINISTRATIVE OFFICER Date: To: From: December 11, 2015 The Mayor The Council Miguel A. Santana, City Administrative Offio CAO File No. 0220-03695-0188 Council File No.

More information

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of Battlefield or IPB as it is more commonly known is a Command and staff tool that allows systematic, continuous

More information

Domestic Nuclear Detection Office (DNDO)

Domestic Nuclear Detection Office (DNDO) Domestic Nuclear Detection Office (DNDO) EFCOG 2007 Executive Council Meeting February 21-22, 2007 Vayl S. Oxford Director, DNDO Department of Homeland Security The radiological / nuclear threat could

More information

Federalism and Crisis Management

Federalism and Crisis Management A Case Study: Terrorist Attacks on September 11 Federalism and Crisis Management Directions - The awesome and terrible events of September 11, 2001 in New York and Washington elicited a multitude of responses

More information

SIA PROPRIETARY NOTE: All speaker comments are off-therecord and not for public release

SIA PROPRIETARY NOTE: All speaker comments are off-therecord and not for public release NOTE: All speaker comments are off-therecord and not for public release Export Control Reform Initiative (ECRI) President Obama initiated a comprehensive review of the US export control system in 2009

More information

NIMS and the Incident Command System (ICS)

NIMS and the Incident Command System (ICS) Introduction The way this nation prepares for and responds to domestic incidents is about to change. It won't be an abrupt change; best practices that have been developed over the years are part of this

More information

UTILIZING CANINE TEAMS TO DETECT EXPLOSIVES AND

UTILIZING CANINE TEAMS TO DETECT EXPLOSIVES AND JUNE 24, 2014 UTILIZING CANINE TEAMS TO DETECT EXPLOSIVES AND MITIGATE THREATS U.S. HOUSE OF REPRESENTATIVES, COMMITTEE ON HOMELAND SECURITY, SUBCOMMITTEE ON TRANSPORTATION SECURITY ONE HUNDRED THIRTEENTH

More information

State Emergency Management and Homeland Security: A Changing Dynamic By Trina R. Sheets

State Emergency Management and Homeland Security: A Changing Dynamic By Trina R. Sheets State Emergency Management and Homeland Security: A Changing Dynamic By Trina R. Sheets The discipline of emergency management is at a critical juncture in history. Even before the horrific events of September

More information

Section 3 Counter-piracy Operations

Section 3 Counter-piracy Operations Section 3 Counter-piracy Operations Piracy is a grave threat to public safety and order on the seas. In particular, for Japan, which depends on maritime transportation to import most of the resources and

More information

Mississippi Emergency Support Function #13 Public Safety and Security Annex

Mississippi Emergency Support Function #13 Public Safety and Security Annex Mississippi Emergency Support Function #13 Public Safety and Security Annex ESF #13 Coordinator Mississippi Department of Public Safety Primary Agencies Mississippi Department of Public Safety Mississippi

More information

Defending the Homeland: The Role of the Alaskan Command

Defending the Homeland: The Role of the Alaskan Command NCTR Annual Convention Defending the Homeland: The Role of the Alaskan Command A L A S K A N A C O M M N D Lt Gen Howie Chandler Commander, Alaskan Command, Alaskan North American Aerospace Defense Command

More information

The FBI s Field Intelligence Groups and Police

The FBI s Field Intelligence Groups and Police The FBI s Field Intelligence Groups and Police Joining Forces By an analyst with the FBI's Directorate of Intelligence ince the terrorist attacks of September 11, 2001, managing and sharing Stimely threat

More information

RISK MANAGEMENT BULLETIN

RISK MANAGEMENT BULLETIN Maryland s New License Plate Readers and Captured Plate Data Law Historically, privacy was almost implicit, because it was hard to find and gather information. But in the digital world, whether it's digital

More information

Team 3: Communication Aspects In Urban Operations

Team 3: Communication Aspects In Urban Operations Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2007-03 Team 3: Communication Aspects In Urban Operations Doll, T. http://hdl.handle.net/10945/35617

More information

Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement

Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement of Mr. Vayl Oxford Acting Director Domestic Nuclear Detection Office Department of Homeland

More information

EVERGREEN IV: STRATEGIC NEEDS

EVERGREEN IV: STRATEGIC NEEDS United States Coast Guard Headquarters Office of Strategic Analysis 9/1/ UNITED STATES COAST GUARD Emerging Policy Staff Evergreen Foresight Program The Program The Coast Guard Evergreen Program provides

More information

Intelligence Analysis for Homeland Security RPAD 557/CEHC 557

Intelligence Analysis for Homeland Security RPAD 557/CEHC 557 Intelligence Analysis for Homeland Security RPAD 557/CEHC 557 Instructor: James E. Steiner, PhD Public Service Professor Director, Homeland Security Programs Rockefeller College SUNY Albany 518-708-4183

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY United States Department of Homeland Security Homeland Security Advisory System Increased to Orange for Mass Transit and Passenger Rail July 7, 2005 ATTENTION: Federal Departments and Agencies, State Homeland

More information

Reduce loss of lives and property MANN ASSOCIATES NIG LTD PRESENTS: &

Reduce loss of lives and property MANN ASSOCIATES NIG LTD PRESENTS: & Reduce loss of lives and property MANN ASSOCIATES NIG LTD PRESENTS: & COUNTER TERRORISM TRAINING SEMINAR FOR THE PRIVATE & PUBLIC SECTOR IN NIGERIA WITH THE LEGENDARY COMMANDER DANIEL SHARON rtd (BSc,

More information

Coast Guard Physical Security And Force Protection Manual

Coast Guard Physical Security And Force Protection Manual Coast Guard Physical Security And Force Protection Manual Authorization 20, Manual Requirements 20, Retention of Customer's Card 20 with the Physical Security and Force Protection Program, COMDINST M5530.1.

More information

The International Association of Chiefs of Police. Presentation on United States Law Enforcement March 23, 2015

The International Association of Chiefs of Police. Presentation on United States Law Enforcement March 23, 2015 The International Association of Chiefs of Police Presentation on United States Law Enforcement March 23, 2015 Types of U.S. State & Local Law Enforcement Agencies City Police Conservation officers County

More information

International Joint Efforts to Address Training Needs in Nuclear Security International Symposium on Nuclear Security 30 March 3 April 2009 Vienna,

International Joint Efforts to Address Training Needs in Nuclear Security International Symposium on Nuclear Security 30 March 3 April 2009 Vienna, International Joint Efforts to Address Training Needs in Nuclear Security International Symposium on Nuclear Security 30 March 3 April 2009 Vienna, Austria International Joint Efforts to Address Training

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19 COMBATING TERRORIST USE OF EXPLOSIVES IN THE UNITED STATES FEBRUARY 12, 2007 Purpose (1) This directive establishes a national policy, calls for the development

More information

U.S. DEPARTMENT OF HOMELAND SECURITY

U.S. DEPARTMENT OF HOMELAND SECURITY U.S. DEPARTMENT OF HOMELAND SECURITY SECRETARY DEPUTY SECRETARY Executive Secretariat Military Advisor MANAGEMENT Under Secretary SCIENCE & TECHNOLOGY Under Secretary NATIONAL PROTECTION & PROGRAMS Under

More information

RE: NASBLA Final Grant Report - BUI Detection and Enforcement: Operation Dry Water Grant No

RE: NASBLA Final Grant Report - BUI Detection and Enforcement: Operation Dry Water Grant No December 20, 2013 Joe Carro Commandant (CG-54222) U.S. Coast Guard 2703 Martin Luther King Jr. Ave SE, Mail Stop 7501 Washington, DC 20593 RE: NASBLA Final Grant Report - BUI Detection and Enforcement:

More information

Operation ENDURING FREEDOM Response. NDIA Expeditionary Warfare Conference

Operation ENDURING FREEDOM Response. NDIA Expeditionary Warfare Conference Operation ENDURING FREEDOM Response NDIA Expeditionary Warfare Conference Briefing Outline National Defense Roles Coast Guard Responsibilities Memoranda of Agreement Domestic/HLS Operations Port Security

More information

Special Report - Senate FY 2013 Department of Homeland Security Appropriations and California Implications - June 2012

Special Report - Senate FY 2013 Department of Homeland Security Appropriations and California Implications - June 2012 THE CALIFORNIA INSTITUTE FOR FEDERAL POLICY RESEARCH 1608 Rhode Island Avenue, NW, Suite 213, Washington, D.C. 20036 202-785-5456 fax:202-223-2330 e-mail: sullivan@calinst.org web: http://www.calinst.org

More information

COE-DAT Course Catalog. Introduction

COE-DAT Course Catalog. Introduction Introduction The Centre of Excellence Defence Against Terrorism (COE-DAT) is pleased to present the Course Catalog, containing a complete listing of courses and educational programs conducted by COE-DAT.

More information

Radiological Nuclear Detection Task Force: A Real World Solution for a Real World Problem

Radiological Nuclear Detection Task Force: A Real World Solution for a Real World Problem Radiological Nuclear Detection Task Force: A Real World Solution for a Real World Problem by Kevin L. Stafford Introduction President Barrack Obama s signing of Presidential Policy Directive 8 (PPD-8),

More information

COAST GUARD. Actions Needed to Improve Strategic Allocation of Assets and Determine Workforce Requirements

COAST GUARD. Actions Needed to Improve Strategic Allocation of Assets and Determine Workforce Requirements May 2016 United States Government Accountability Office Report to the Chairman, Subcommittee on Coast Guard and Maritime Transportation, Committee on Transportation and Infrastructure, House of Representatives

More information

CHAPTER 7 MANAGING THE CONSEQUENCES OF DOMESTIC WEAPONS OF MASS DESTRUCTION INCIDENTS

CHAPTER 7 MANAGING THE CONSEQUENCES OF DOMESTIC WEAPONS OF MASS DESTRUCTION INCIDENTS CHAPTER 7 MANAGING THE CONSEQUENCES OF DOMESTIC WEAPONS OF MASS DESTRUCTION INCIDENTS Consequence management is predominantly an emergency management function and includes measures to protect public health

More information

IAD Quick Facts Dulles Security Approach TSA Operational Assets IAD Partnerships Elements of Security Risk-Based Security (RBS) Screening Personnel,

IAD Quick Facts Dulles Security Approach TSA Operational Assets IAD Partnerships Elements of Security Risk-Based Security (RBS) Screening Personnel, 1 IAD Quick Facts Dulles Security Approach TSA Operational Assets IAD Partnerships Elements of Security Risk-Based Security (RBS) Screening Personnel, Equipment, Programs Training BDA Program Compliance

More information

Office of University Programs (OUP) Webinar: Funding Opportunity Announcement for the Coastal Resilience Center of Excellence Center Lead

Office of University Programs (OUP) Webinar: Funding Opportunity Announcement for the Coastal Resilience Center of Excellence Center Lead Office of University Programs (OUP) Webinar: Funding Opportunity Announcement for the Coastal Resilience Center of Excellence Center Lead Date Science and Technology Directorate May 2014 www.hsuniversityprograms.org

More information

BioWatch Overview. Current Operations Future Autonomous Detection. June 25, 2013 Michael V. Walter, Ph.D.

BioWatch Overview. Current Operations Future Autonomous Detection. June 25, 2013 Michael V. Walter, Ph.D. BioWatch Overview Current Operations Future Autonomous Detection June 25, 2013 Michael V. Walter, Ph.D. Detection Branch Chief and BioWatch Program Manager Office of Health Affairs Department of Homeland

More information

GAO COMBATING TERRORISM. Use of National Guard Response Teams Is Unclear

GAO COMBATING TERRORISM. Use of National Guard Response Teams Is Unclear GAO United States General Accounting Office Testimony Before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on Government Reform, House of Representatives

More information

The European Border and Coast Guard Agency

The European Border and Coast Guard Agency The European Border and Coast Guard Agency Remotely Piloted Aircraft Systems in the EU frontiers Montreal, 19 September 2017 Zdravko Kolev, Research & Innovation Unit zdravko.kolev@frontex.europa.eu WHAT

More information

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13

December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13 8591 December 21, 2004 NATIONAL SECURITY PRESIDENTIAL DIRECTIVE NSPD-41 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE HSPD-13 MEMORANDUM FOR THE VICE PRESIDENT THE SECRETARY OF STATE THE SECRETARY OF THE TREASURY

More information

National Resource and Technical Assistance Center for Improving Law Enforcement Investigations

National Resource and Technical Assistance Center for Improving Law Enforcement Investigations Readers to Enhance Criminal Investigations Assistant Chief of Police Travis Martinez Redlands Police Department Introduction With the vast majority of crimes involving the use of motor vehicles, law enforcement

More information

Page 1 of 87. DHS-16-ST-061-HSQA-Partner

Page 1 of 87. DHS-16-ST-061-HSQA-Partner The Department of Homeland Security (DHS) Notice of Funding Opportunity (NOFO) DHS Science and Technology Directorate (S&T) Center of Excellence (COE) Center for Homeland Security Quantitative Analysis

More information

May 27, RESOLUTION

May 27, RESOLUTION May 27, 2014 3 RESOLUTION CONSIDERING APPROVING A MEMORANDUM OF UNDERSTANDING REGARDING THE etrace INTERNET BASED FIREARM TRACING APPLICATION WITH THE BUREAU OF ALCOHOL, TOBACCO, FIREARMS AND EXPLOSIVES

More information

MEDICAL_MAS: an Agent-Based System for Medical Diagnosis

MEDICAL_MAS: an Agent-Based System for Medical Diagnosis MEDICAL_MAS: an Agent-Based System for Medical Diagnosis University Petroleum-Gas of Ploiesti, Department of Informatics, Bdul Bucuresti Nr. 39, Ploiesti, 100680, Romania Abstract The paper describes an

More information

NYS Office of Homeland Security Upcoming Training Course spotlights and schedule

NYS Office of Homeland Security Upcoming Training Course spotlights and schedule NEW YORK STATE OFFICE OF HOMELAND SECURITY TRAINING SCHEDULE AS OF JANUARY 22, 2009 NYS Office of Homeland Security Upcoming Training Course spotlights and schedule INCIDENT RESPONSE TO TERRORIST BOMBING

More information

Combating Terrorism: Prevention, Protection & Response

Combating Terrorism: Prevention, Protection & Response 13-14 June 2016 Hong Kong Combating Terrorism: Prevention, Protection & Response Nowhere to run, Nowhere to hide Key Benefits of Attending This Workshop: UNDERSTAND why defining and labeling terrorism

More information

6 th Annual Joint Civil & DoD CBRN Symposium

6 th Annual Joint Civil & DoD CBRN Symposium Defense Strategies Institute professional educational forum: 6 th Annual Joint Civil & DoD CBRN Symposium ~ Advancing a Government Wide Approach to CBRN Defense, Readiness & Response ~ March 5-6, 2018

More information

Technology Development in Support of Port Security. Michael S. Bruno Stevens Institute of Technology July 19, 2012

Technology Development in Support of Port Security. Michael S. Bruno Stevens Institute of Technology July 19, 2012 Technology Development in Support of Port Security Michael S. Bruno Stevens Institute of Technology July 19, 2012 The National Center for Secure and Resilient Maritime Commerce CSR A Department of Homeland

More information

2017 National Fusion Center Association. Annual Training Event. At-a-Glance Program

2017 National Fusion Center Association. Annual Training Event. At-a-Glance Program 2017 National Fusion Center Association Annual Training Event At-a-Glance Program At-a-Glance Agenda National Fusion Center Association Annual Training Event Hilton Mark Center Alexandria, Virginia November

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 28 APRIL 2014 Operations AIR FORCE EMERGENCY MANAGEMENT PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:

More information

Funding Resources for. Your Community s. Communications Project. Grants Information Provided by:

Funding Resources for. Your Community s. Communications Project. Grants Information Provided by: Funding Resources for Your Community s Communications Project Grants Information Provided by: www.grantsoffice.com 2008 Grants Office, LLC All Rights Reserved Funding Resources for Your Community s Communications

More information

Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction

Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction A 349829 Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction Defending the U.S. Homeland ANTHONY H. CORDESMAN Published in cooperation with the Center for Strategic and International Studies,

More information

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J3 CJCSI 3121.02 DISTRIBUTION: A, C, S RULES ON THE USE OF FORCE BY DOD PERSONNEL PROVIDING SUPPORT TO LAW ENFORCEMENT AGENCIES CONDUCTING COUNTERDRUG

More information

Annual Report 2015 Japan's Actions against Piracy off the Coast of Somalia and in the Gulf of Aden

Annual Report 2015 Japan's Actions against Piracy off the Coast of Somalia and in the Gulf of Aden March 2016 The Cabinet Secretariat The Government of Japan 1 Annual Report 2015 Japan's Actions against Piracy off the Coast of Somalia and in the Gulf of Aden Somalia and the Surroundings (off the Coast

More information

Posse Comitatus Has the Posse outlived its purpose? Craig T. Trebilcock

Posse Comitatus Has the Posse outlived its purpose? Craig T. Trebilcock Posse Comitatus Has the Posse outlived its purpose? Craig T. Trebilcock The Posse Comitatus Act 1, has been a limitation on the use of military forces in civilian law enforcement operations since the Nineteenth

More information

(U//FOUO) Recent Active Shooter Incidents Highlight Need for Continued Vigilance

(U//FOUO) Recent Active Shooter Incidents Highlight Need for Continued Vigilance (U//FOUO) Recent Active Shooter Incidents Highlight Need for Continued Vigilance 27 December 2012 (U) Scope (U//FOUO) This Joint Intelligence Bulletin (JIB) is intended to provide information on the recent

More information

Mirror Image: Training to Combat Terrorism

Mirror Image: Training to Combat Terrorism Mirror Image: Training to Combat Terrorism Register Now for the November 13-17, January 8-12, 2018 and February 26-March 3, 2018 Counter-Terrorism Total Immersion Training Program The Terrorism Research

More information

Contingency Planning, Emergency Management & Marine Transportation Policy Leader

Contingency Planning, Emergency Management & Marine Transportation Policy Leader Contingency Planning, Emergency Management & Marine Transportation Policy Leader Transitioning Coast Guard leader that collaborates with diverse internal and external stakeholders to deliver results in

More information

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION

NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION NATO MEASURES ON ISSUES RELATING TO THE LINKAGE BETWEEN THE FIGHT AGAINST TERRORISM AND THE PROLIFERATION OF WEAPONS OF MASS DESTRUCTION Executive Summary Proliferation of WMD NATO s 2009 Comprehensive

More information

IRDG R&D Tax Credit Clinic. 19 th January 2016 Radisson Blu, Dublin Airport

IRDG R&D Tax Credit Clinic. 19 th January 2016 Radisson Blu, Dublin Airport The Background IRDG R&D Tax Credit Clinic 19 th January 2016 Radisson Blu, Dublin Airport R&D Tax Credit Background 1,500 companies now claiming 400m+ per annum 2004 75 Companies claim 70.5m 2008 582 companies

More information

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department.

Statement of. Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department. Statement of Michael P. Downing Assistant Commanding Officer Counter-Terrorism/Criminal Intelligence Bureau Los Angeles Police Department Before the Committee on Homeland Security s Subcommittee on Intelligence,

More information