Developing Algorithms and Software Assistants for Security Domains

Size: px
Start display at page:

Download "Developing Algorithms and Software Assistants for Security Domains"

Transcription

1 CREATE Research Archive Research Project Summaries 2010 Developing Algorithms and Software Assistants for Security Domains Milind Tambe University of Southern California, Follow this and additional works at: Recommended Citation Tambe, Milind, "Developing Algorithms and Software Assistants for Security Domains" (2010). Research Project Summaries. Paper 6. This Article is brought to you for free and open access by CREATE Research Archive. It has been accepted for inclusion in Research Project Summaries by an authorized administrator of CREATE Research Archive. For more information, please contact

2 Developing Algorithms and Software Assistants for Security Domains Milind Tambe, University of Southern California 1. Executive Summary Research Accomplishments... 2 Algorithms For Efficient Scalable Algorithms... 2 Algorithms for Robust Algorithms and Handling Human Biases... 4 Evaluation with Human Subjects Applied Relevance: Real world Deployments Collaborative Projects Research Products Publications and Reports Presentations Software Tools and Products Education and Outreach Products Executive Summary This research has been at the forefront of applying computational game theory techniques for security. It has led to a wide range of actual deployed applications of game theory for security. Our first application, Assistant for Randomized Monitoring Over Routes (ARMOR), successfully deployed game theory in practice at the Los Angeles International Airport (LAX) in 2007, and has been in use since. In particular, ARMOR uses game theory to randomize allocation of police checkpoints and canine units. Our second application, Intelligent Randomization in Scheduling (IRIS), is in use by the US Federal Air Marshal Service since 2009 to deploy air marshals on US air carriers. A third application, Game-theoretic Unpredictable And Randomly Deployed Security (GUARDS), for the US Transportation Security Administration is getting evaluated for a national deployment across over 400 United States airports. A fourth application, Port Resilience Operational / Tactical Enforcement to Combat Terrorism (PROTECT), for the United States Coast Guard, is under development for a demonstration at the Port of Boston for evaluation; and many other agencies around the globe are now looking to deploy these techniques. These systems focus on the game-theoretic method of providing efficient randomization of security plans and processes. Casting the problem as a Bayesian Stackelberg game, they obtain randomized strategies for security agents; one of the fundamental advances in all these systems then is to provide the fastest algorithms known-to-date to solve such games. The strength of this research is the marriage of strong theoretical game-theoretic foundations with practical applications, and the virtuous cycle of theory and practice to benefit from each other. These deployments of applications in the real-world has led to significant interest from the media and other potential users/customers, and substantial research. This research was supported by the United States Department of Homeland Security through the National Center for Risk and Economic Analysis of Terrorism Events (CREATE) under award number 2010-ST-061-RE0001. However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security, or the University of Southern California, or CREATE.

3 Figure 1 A checkpoint scheduled by ARMOR at the LAX International Airport. Figure 2 IRIS schedules air marshals on board commercial planes. Keywords related to the project: Keyword 1: Game Theory, Bayesian Stackelberg games Keyword 2: Security domains Keyword 3: Software scheduling assistants 2. Research Accomplishments At the heart of our applications are the efficient algorithms created to solve the very large games to provide optimal strategies for the defender in the Stackelberg games that are deployed. This challenge of fast Stackelberg game solvers is the primary research challenge we have addressed to this point, but this remains a daunting challenge. Furthermore, the presence of uncertainty and human biases further complicate the problem. These algorithms combine computational techniques from Computer Science with the insights from Operations Research literature, and thus are at the cutting edge of both these fields. The advances reported here were necessary for the deployed application; list of key publications is available in the appendix. Algorithms For Efficient Scalable Algorithms Scale-up challenges arise in these games due to at least three different reasons: 1. Growth in the number of defender strategies: There may be a very large number of ways in which the limited defender resources may be allocated to targets. For example, in the IRIS system, with just 100 flights, and 10 air marshals, we have C , i.e different ways of allocating air marshals to flights. 2. Growth in the number of attacker strategies: The growth in attacker strategies may arise because the attacker may have multiple different ways of evading defender actions and then attack particular targets. This explosion of attacker strategies is seen to arise in the GUARDS system. Indeed, such growth in attacker strategies is also seen in other applications where the defender s actions involve protecting targets embedded in a network, e.g. protecting important locations in a city that are embedded in the city s road network. In such situations, the attacker can follow many different paths to get to the targets of interest. Page 2 of 13

4 3. Growth in the number of attacker types: The security forces may be facing many types of attackers. For example, the LAX police need to protect the airport not only from terrorists but also from local LA gangs and even disgruntled employees. When there is an increase in the number of these attacker types, each attacker type increases the computational complexity by an exponential factor. To address these complexities, we have created a range of different algorithms described in the table below. The first game-theoretic algorithms were designed in 2007, and newer algorithms continue to be designed to address on-going challenges. Further improvements are required, and we anticipate that newer algorithms providing additional speedup techniques will continue to emerge. Example Scale-up: Defender Scale-up: Attacker Scale-up: Algorithm Solution Type Domain Actions Actions Attacker Types (Year) LAX Low Low Medium Approximate ASAP (2007) LAX Low Low Medium Exact DOBSS (2007) FAMS High Low Low Approximate ORIGAMI (2009) FAMS High Low Low Approximate ERASER-C (2009) FAMS High Low Low Exact ASPEN (2010) Urban RANGER High High Low Approximate Security (2010) Urban RUGGED High High Low Exact Security (2011) LAX Low Low High Exact HBGS (2011) FAMS High Low High Exact HBSA (2011) Table 1 List of Algorithms Addressing Scalability in Real-world Security Domains (Most recent work in green) Page 3 of 13

5 Algorithms for Robust Algorithms and Handling Human Biases Real-world domains present different sorts of uncertainties: there are uncertainties in the preferences of the attackers (Bayesian Games); in their abilities to compute (bounded rationality) and whether human biases affect their decision making. We have developed algorithms geared to handle such uncertainties of the real-world, and plan to continue to develop even more robust algorithms in the future. Example Domain Addressed Issue Algorithm (Year) LAX LAX FAMS TSA Activities Table 2 List of Algorithms Addressing Robustness Issues in Real-world Security Domains (Most recent work in green) Evaluation with Human Subjects Rationality / Robustness in Attacker s Observations Attacker Preferences (Bayesian Games) Attacker Preferences (Bayesian Games) Attacker Capability (attacker circumvents security measures) Tambe et. al, University of Southern California COBRA (2009) HBGS (2011) HBSA (2011) GUARDS (2011) We have also evaluated the performance of our algorithms against human subjects. We developed a Pirates and Treasure game modeling the real-security problem at LAX, and compare different approaches, involving 158 human subjects playing 3160 instances of the games in total. The final conclusion clusion was that a model that incorporates both the ideas of robustness and human behavior achieves statistically significant better rewards and also maintains equivalent or faster solution speeds compared to existing approaches. Figure 3 A Screenshot of the "Pirates and Treasure" Game Modeling the Security Problem at LAX. 3. Applied Relevance: Real world Deployments Page 4 of 13

6 Real-world applications are the result of a unique collaboration where university researchers work directly with a security agency for the purpose of creating a useful product to potentially deploy outcomes of research on a national scale. These collaborations to transition research to large-scale real-world deployments have presented valuable lessons. They have taught us how to bridge the culture gap between academic researchers and real-world operators. This section briefly describes our different applications. 3.1 ARMOR Our first application of security games was ARMOR (Assistant for Randomized Monitoring Over Routes). This application emerged in 2007 after police at the Los Angeles International Airport (LAX) approached us with the question of how to randomize deployment of their limited security resources. For example, they have six inbound roads into LAX, and they wished to set up checkpoints. There are not enough police to set up checkpoints on all roads at all times. So the question is where and when to set up these checkpoints. Similarly, they have eight terminals but not enough explosive-detecting canine units to patrol all terminals at all times of the day (a canine unit is limited by the number of hours a dog can work per day). Given that LAX may be under surveillance by adversaries, the question is where and when to have the canine units patrol the different terminals. The police approached us in April 2007 after we had designed our first set of algorithms. While the algorithms were ready, we needed to spend several months acquiring knowledge, understanding how different police units performed their duties, constraints on their operations in terms of shifts of operations, obtaining detailed data on passenger loads at different times of the day at different terminals and so on. The passenger data, for example, influences how payoffs are determined in our underlying game representation --- our adversaries would want to cause maximum harm to civilians and the higher the passenger load, the higher the payoff to the adversaries. By August of 2007, after multiple iterations, the police started using ARMOR for setting up checkpoints and later for canine patrols. The backbone of ARMOR are algorithms for solving Bayesian Stackelberg games as discussed in the following; they recommend a randomized pattern for setting up checkpoints and canine unit patrols. Police provide inputs like the number of available canine units; ARMOR then provides to the police an hour-by-hour schedule for where to set up canine patrols. ARMOR continues to be in use at LAX since 2007 and has undergone periodic updates to its software. The ARMOR system has received numerous accolades for its use. 3.2 IRIS After ARMOR, we were contacted by the Federal Air Marshals Service (FAMS). Their challenge is to randomize allocations of air marshals to flights to avoid predictability by Page 5 of 13

7 adversaries conducting surveillance (e.g. these might be part of an insider threat), yet provide adequate protection to more important flights. We are focused in particular on some sectors of international flights. Even within that domain, there are a very large number of flights over a month, and not enough air marshals to cover all the flights. To accomplish the goal of randomized allocation of air marshals to flight, we constructed a system called IRIS (Intelligent Randomization In Scheduling). We delivered the system to the FAMS in Spring After extensive testing, the FAMS started using this system in October At its backend, IRIS casts the problem it solves as a Stackelberg game and in particular as a security game. We have focused in particular on the special nature of the security game framework to build fast algorithms for IRIS. 3.3 GUARDS After IRIS, our next focus was GUARDS. GUARDS (Game-theoretic Unpredictable and Randomly Deployed Security) was developed in collaboration with the United States Transportation Security Administration (TSA) to assist in resource allocation tasks for airport protection at over four hundred United States airports. In contrast with ARMOR and IRIS, which focus on one installation/applications and one security activity (e.g. canine patrol or checkpoints) per application, GUARDS reasons with multiple security activities, diverse potential threats and also hundreds of end users. The goal for GUARDS is to allocate TSA personnel to security activities conducted to protect the airport infrastructure; GUARDS does not focus on checking passengers. GUARDS again utilizes a Stackelberg game, but generalizes beyond security games and develops a novel solution algorithm for these games. GUARDS has been delivered to the TSA and is currently under evaluation and testing for scheduling practices at an undisclosed airport. If successful, the TSA intends to incorporate the system into their unpredictable scheduling practices nationwide. 3.4 Beyond ARMOR/IRIS/GUARDS Beyond ARMOR, IRIS and GUARDS, more recently, we have started a pilot project with the United States Coast Guard to build a new system called PROTECT (Port Resilience Operational / Tactical Enforcement to Combat Terrorism). The goal in PROTECT is to recommend randomized patrolling strategies for the coast guard while taking into account weights of different targets protected in their area of operation and adversary reaction to any patrolling strategy. We will begin with a demonstration and evaluation in the port of Boston and depending on our results there, proceed to other ports. Page 6 of 13

8 There are many other security agencies in the United States and beyond that have expressed an interest in using the Stackelberg game model for improving their operations. One application might be protecting important locations in a city by setting up randomized checkpoints throughout the city, e.g following the devastating attacks in November 2008, Police in Mumbai set up randomized checkpoints throughout the road networks in the city to try to protect the city. Furthermore, while counter-terrorism has remained a key focus of the work so far, the new projects are now extending the application arena to include crime suppression and other objectives. For example, one such application might be improved randomized checking of ticketless travelers on trains; yet another one might be randomized checking to support food distribution networks of charity organizations. Other such applications are being discussed. 4 Collaborative Projects From the very beginning, all of our projects, ARMOR, IRIS, GUARDS, PROTECT required extensive collaboration with security agencies. Indeed, we have deployed the ARMOR- Checkpoints and ARMOR-K9 in collaboration with the Los Angeles World Airport (LAWA) police. This collaboration has involved extensive meetings with LAWA police personnel to calibrate the data and include specific constraints of each problem to the DOBSS model. We have provided LAWA police with alternative schedules of vehicle checkpoints and K-9 patrols obtained from the ARMOR software and have received feedback on the ease of use and effectiveness of the recommendations. We have had a close collaboration with Federal Air Marshals (FAMs) for IRIS, and with the TSA for GUARDS. We have continued to visit TSA headquarters, and hosted their visits to USC. We are also in constant discussion with the United States Coast Guard for development of the PROTECT model. 5 Research Products Research Products (Please detail below) # 5a # of peer-reviewed journal reports published 12 5a # of peer-reviewed journal reports accepted for publication 5a # of non-peer reviewed publications and reports 5a # of scholarly journal citations of published reports >350 5b # of scholarly presentations (conferences, workshops, seminars) 5b # of outreach presentations (non-technical groups, general public) 5c # of products delivered to DHS, other Federal agencies, or State/Local 4 5c # of patents filed 2 5c # of patents issued 5c # of products in commercialization pipeline (products not yet to market) Page 7 of 13

9 5c # of products introduced to market Tambe et. al, University of Southern California Page 8 of 13

10 5.1 Publications and Reports CREATE PUBLICATIONS Research Area Referred Not Referred PDF Available for DHS 1. J. Pita, M. Jain, F. Ordonez, M. Tambe, S. Kraus Solving Stackelberg Games in the Real-World: Addressing Bounded Rationality and Limited Observations in Human Cognition Artificial Intelligence Journal, 174(15): , M. Jain, J. Pita, J. Tsai, C. Kiekintveld, S. Rathi, F. Ordonez, M. Tambe Software Assistants for patrol planning at LAX and Federal Air Marshals Service. Interfaces, 40(4): , 2010.Finalist, EURO Excellence in Practice Award EEPA M. Taylor, C. Kiekintveld, C. Western, M. Tambe A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR? In Informatica, 34: , C. Kiekintveld, J. Marecki, M. Tambe Approximation Methods for Infinite Bayesian Stackelberg Games: Modeling Distributional Uncertainty In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May M.Jain, C. Kiekintveld, M. Tambe Quality-bounded Solutions for Finite Bayesian Stackelberg Games: Scaling up In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May M.Jain, D. Korzhyk, O. Vanek, M. Pechoucek, V. Conitzer, M. Tambe A Double Oracle Algorithm for Zero-Sum Security Games on Graphs In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May J. Pita, C. Kiekintveld, M. Tambe, E. Steigerwald, S. Cullen GUARDS - Game Theoretic Security Allocation on a National Scale In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS) Finalist, Best Paper Award, Innovative Applications, May M. Jain, C. Kiekintveld, E. Kardes, F. Ordonez, M. Tambe Security games with arbitrary schedules: A branch and price approach Proceedings of the National Conference on Artificial Intelligence (AAAI), July J. Tsai, J. Kwak, Z. Yin, C. Kiekintveld, D. Kempe, M. Tambe Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains Proceedings of the National Conference on Artificial Intelligence (AAAI), July Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, M. Tambe Stackelberg vs. Nash in Security Games: Interchangeability, Equivalence, and Uniqueness In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May J. Tsai, J. Kwak, Z. Yin, C. Kiektinveld, D. Kempe, M. Tambe How to Protect a City: Strategic Security Placement in Graph-Based Domains In Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), May 2010 Page 9 of 13

11 CREATE PUBLICATIONS Research Area Referred Not Referred PDF Available for DHS 12. C. Kiekintveld, J. Marecki, M. Tambe Methods and Algorithms for Infinite Bayesian Stackelberg Security Games In Decision and Game Theory for Security (GameSec 2010), May 2010 Page 10 of 13

12 5.2 Presentations 1. M. Jain, J. Pita, J. Tsai, C. Kiekintveld, S. Rathi, F. Ordonez, M. Tambe Software Assistants for patrol planning at LAX and Federal Air Marshals Service. Interfaces, 40(4): , 2010.Finalist, EURO Excellence in Practice Award EEPA C. Kiekintveld, J. Marecki, M. Tambe Approximation Methods for Infinite Bayesian Stackelberg Games: Modeling Distributional Uncertainty In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May M.Jain, C. Kiekintveld, M. Tambe Quality-bounded Solutions for Finite Bayesian Stackelberg Games: Scaling up In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May M.Jain, D. Korzhyk, O. Vanek, M. Pechoucek, V. Conitzer, M. Tambe A Double Oracle Algorithm for Zero-Sum Security Games on Graphs In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May J. Pita, C. Kiekintveld, M. Tambe, E. Steigerwald, S. Cullen GUARDS - Game Theoretic Security Allocation on a National Scale In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS) Finalist, Best Paper Award, Innovative Applications, May M. Jain, C. Kiekintveld, E. Kardes, F. Ordonez, M. Tambe Security games with arbitrary schedules: A branch and price approach Proceedings of the National Conference on Artificial Intelligence (AAAI), July J. Tsai, J. Kwak, Z. Yin, C. Kiekintveld, D. Kempe, M. Tambe Urban Security: Game- Theoretic Resource Allocation in Networked Physical Domains Proceedings of the National Conference on Artificial Intelligence (AAAI), July Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, M. Tambe Stackelberg vs. Nash in Security Games: Interchangeability, Equivalence, and Uniqueness In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS), May 2010 Page 11 of 13

13 5.1 Software Tools and Products Tambe et. al, University of Southern California The following softwares have been delivered; updates to the softwares continue to be made. SOFTWARE PRODUCTS Project Leader(s) Date Delivered Item Agency Receiving Product Agency POC Commercialization Status Tambe PROTECT Coast Guard Craig Baldwin Under development Tambe GUARDS TSA Erin Steigerwald delivered Tambe IRIS FAMS James Curren delivered; pipeline Tambe ARMOR LAWA Police Ernest Cruz delivered; pipeline Tambe ARMOR LAWA Police James Butts delivered; pipeline 6 Education and Outreach Products Education and Outreach Initiatives (Please detail below) # # of students supported (funded by CREATE) 5 # of students involved (funded by CREATE + any other programs) # of students graduated # of contacts with DHS, other Federal agencies, or State/Local (committees) # of existing courses modified with new material # of new courses developed # of new certificate programs developed # of new degree programs developed All students/postdoctoral researchers involved: Postdoctoral researchers: Bo An PhD students: Manish Jain Zhengyu Yin Eric Sheih Graduate Fellows: Scott Alfeld Jason Tsai James Pita Page 12 of 13

14 Undergraduate students: Andrew Ogden Page 13 of 13

Developing Algorithms and Software Assistants for Security Domains

Developing Algorithms and Software Assistants for Security Domains CREATE Research Archive Research Project Summaries 2012 Developing Algorithms and Software Assistants for Security Domains Milind Tambe University of Southern California, tambe@usc.edu Follow this and

More information

PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response

PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response PROTECT in the Ports of Boston, New York and Beyond: Experiences in Deploying Stackelberg Security Games with Quantal Response Eric Shieh, Bo An, Rong Yang, Milind Tambe, Craig Baldwin, Joseph DiRenzo,

More information

William Switzer, III, pursuant to 28 U.S.C. 1746, declares as follows: 1. I am the Federal Security Director ("FSD") appointed by the Transportation

William Switzer, III, pursuant to 28 U.S.C. 1746, declares as follows: 1. I am the Federal Security Director (FSD) appointed by the Transportation UNITED STATES DISTRICT COURT DISTRICT OF COLUMBIA STEVEN BIERFELDT, ) ) Plaintiff, ) ) v. ) No. 09-cv-Ol117 ) JANET NAPOLITANO, as Secretary, ) Department of Homeland Security, ) ) Defendant. ) DECLARATION

More information

Chapter 17: Foreign Policy and National Defense Section 2

Chapter 17: Foreign Policy and National Defense Section 2 Chapter 17: Foreign Policy and National Defense Section 2 Objectives 1. Summarize the functions, components, and organization of the Department of Defense and the military departments. 2. Explain how the

More information

Federal Funding for Homeland Security. B Border and transportation security Encompasses airline

Federal Funding for Homeland Security. B Border and transportation security Encompasses airline CBO Federal Funding for Homeland Security A series of issue summaries from the Congressional Budget Office APRIL 30, 2004 The tragic events of September 11, 2001, have brought increased Congressional and

More information

Washington State Patrol

Washington State Patrol Washington State Patrol Vessel and Terminal Security Division Operations Briefing Presented to: AAPA Port Security Seminar July 19, 2006 For Official Use Only 1 Mission Statement: The Vessel and Terminal

More information

Northern California Area Maritime Security Committee

Northern California Area Maritime Security Committee Northern California Area Maritime Security Committee 1. MISSION San Francisco Security Information White Paper The mission of this Area Maritime Security Committee is to help coordinate planning, information

More information

North Carolina Information Sharing and Analysis Center NCISAAC

North Carolina Information Sharing and Analysis Center NCISAAC North Carolina Information Sharing and Analysis Center NCISAAC What is a Fusion Center? Following the terrorist attacks of September 11, 2001, our country was forced to take a critical look at the established

More information

City of Torrance Police Department

City of Torrance Police Department City of Torrance Police Department Testimony of John J. Neu Chief of Police Hearing on Radicalization, Information Sharing and Community Outreach: Protecting the Homeland from Homegrown Terror United States

More information

Team 3: Communication Aspects In Urban Operations

Team 3: Communication Aspects In Urban Operations Calhoun: The NPS Institutional Archive Faculty and Researcher Publications Faculty and Researcher Publications 2007-03 Team 3: Communication Aspects In Urban Operations Doll, T. http://hdl.handle.net/10945/35617

More information

A Practical Dialogue on Concessions, Concessionaires, and Airport Security. November 1, 2006

A Practical Dialogue on Concessions, Concessionaires, and Airport Security. November 1, 2006 A Practical Dialogue on Concessions, Concessionaires, and Airport Security November 1, 2006 Today s s Rules of Engagement Public Dialogue Microphone Placement Questions, Comments, Challenges, Diatribes,

More information

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC Intelligence Preparation of Battlefield or IPB as it is more commonly known is a Command and staff tool that allows systematic, continuous

More information

between the U.S. and the respective countries and 14 agreements on technical assistance and information sharing. Also of note in 2011, the Military Op

between the U.S. and the respective countries and 14 agreements on technical assistance and information sharing. Also of note in 2011, the Military Op Statement of Robert S. Bray Assistant Administrator Transportation Security Administration U.S. Department of Homeland Security Before the United States House of Representatives Transportation Security

More information

Strong. Secure. Engaged: Canada s New Defence Policy

Strong. Secure. Engaged: Canada s New Defence Policy Strong. Secure. Engaged: Canada s New Defence Policy Putting People First Long-term Capability Investments Spending Growth and Financial Transparency Bold New Vision 2 Putting People First People are the

More information

The Security War. AAPA Security Meeting Jul 18, Jay Grant, Director Port Security Council

The Security War. AAPA Security Meeting Jul 18, Jay Grant, Director Port Security Council The Security War AAPA Security Meeting Jul 18, 2007 Jay Grant, Director Port Security Council Port Security Council Mission + The Council brings public port authorities and commercial partners together

More information

Jll'l. 1 ft-?! T-? I. U fe> II IlfiX IWA. «/Cx7. EEtn. _r. Eric Garcetti Mayor

Jll'l. 1 ft-?! T-? I. U fe> II IlfiX IWA. «/Cx7. EEtn. _r. Eric Garcetti Mayor Jll'l > M «iiic n n U fe> 1 ft- 1T111?! T-? I II IlfiX IWA ««/Cx7 O EEtn A _r. I m r IN \ Eric Garcetti Mayor September 21,2016 Honorable Members of the City Council c/o City Clerk Room 395, City Hall

More information

Homeland Security And Federal Law Enforcement Career Guide By Gould Editorial Staff READ ONLINE

Homeland Security And Federal Law Enforcement Career Guide By Gould Editorial Staff READ ONLINE Homeland Security And Federal Law Enforcement Career Guide By Gould Editorial Staff READ ONLINE If searched for a ebook by Gould Editorial Staff Homeland Security and Federal Law Enforcement Career Guide

More information

Planning Terrorism Counteraction ANTITERRORISM

Planning Terrorism Counteraction ANTITERRORISM CHAPTER 18 Planning Terrorism Counteraction At Army installations worldwide, terrorism counteraction is being planned, practiced, assessed, updated, and carried out. Ideally, the total Army community helps

More information

NIMS and the Incident Command System (ICS)

NIMS and the Incident Command System (ICS) Introduction The way this nation prepares for and responds to domestic incidents is about to change. It won't be an abrupt change; best practices that have been developed over the years are part of this

More information

The FBI s Field Intelligence Groups and Police

The FBI s Field Intelligence Groups and Police The FBI s Field Intelligence Groups and Police Joining Forces By an analyst with the FBI's Directorate of Intelligence ince the terrorist attacks of September 11, 2001, managing and sharing Stimely threat

More information

A Very Big Branch. We ve Got a Job to Do. Help From Many. Carrying Out Laws: Enforcement. Name: The Executive Branch

A Very Big Branch. We ve Got a Job to Do. Help From Many. Carrying Out Laws: Enforcement. Name: The Executive Branch We ve Got a Job to Do The job of the executive branch is to carry out the laws that the legislative branch passes. When you think of the executive branch, you probably think of the president. But the president

More information

U.S. Air Force Electronic Systems Center

U.S. Air Force Electronic Systems Center U.S. Air Force Electronic Systems Center A Leader in Command and Control Systems By Kevin Gilmartin Electronic Systems Center The Electronic Systems Center (ESC) is a world leader in developing and fielding

More information

Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017

Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017 Prepared Remarks for the Honorable Richard V. Spencer Secretary of the Navy Defense Science Board Arlington, VA 01 November 2017 Thank you for the invitation to speak to you today. It s a real pleasure

More information

Cognitive Triangle. Dec The Overall classification of this Briefing is UNCLASSIFIED

Cognitive Triangle. Dec The Overall classification of this Briefing is UNCLASSIFIED Cognitive Triangle Dec 2012 THIS INFORMATION IS FURNISHED WITH THE UNDERSTANDING THAT IT IS TO BE USED FOR DEFENSE PURPOSES ONLY; THAT IT IS TO BE AFFORDED ESSENTIALLY THE SAME DEGREE OF SECURITY PROTECTION

More information

Reduce loss of lives and property MANN ASSOCIATES NIG LTD PRESENTS: &

Reduce loss of lives and property MANN ASSOCIATES NIG LTD PRESENTS: & Reduce loss of lives and property MANN ASSOCIATES NIG LTD PRESENTS: & COUNTER TERRORISM TRAINING SEMINAR FOR THE PRIVATE & PUBLIC SECTOR IN NIGERIA WITH THE LEGENDARY COMMANDER DANIEL SHARON rtd (BSc,

More information

National Response Plan ESF #13 Public Safety and Security Annex & Terrorism Incident Law Enforcement and Investigation Annex

National Response Plan ESF #13 Public Safety and Security Annex & Terrorism Incident Law Enforcement and Investigation Annex National Response Plan ESF #13 Public Safety and Security Annex & Terrorism Incident Law Enforcement and Investigation Annex OSC Readiness Training November 18, 2004 ESF #13 Public Safety and Security

More information

Introduction to Homeland Security Administration of Justice (ADJU 10AB) Course number

Introduction to Homeland Security Administration of Justice (ADJU 10AB) Course number Introduction to Homeland Security Administration of Justice (ADJU 10AB) Course number Fall Semester 2012 Instructor: Don Meredith Class Day/Time: Class Location: Required Text: Required Supplies: Tuesday,

More information

Special Report - Senate FY 2013 Department of Homeland Security Appropriations and California Implications - June 2012

Special Report - Senate FY 2013 Department of Homeland Security Appropriations and California Implications - June 2012 THE CALIFORNIA INSTITUTE FOR FEDERAL POLICY RESEARCH 1608 Rhode Island Avenue, NW, Suite 213, Washington, D.C. 20036 202-785-5456 fax:202-223-2330 e-mail: sullivan@calinst.org web: http://www.calinst.org

More information

Maritime Risk Symposium Public & Private Partnerships. Bethann Rooney The Port Authority of NY & NJ November 7, 2011

Maritime Risk Symposium Public & Private Partnerships. Bethann Rooney The Port Authority of NY & NJ November 7, 2011 Maritime Risk Symposium Public & Private Partnerships Bethann Rooney The Port Authority of NY & NJ November 7, 2011 The Port of New York & New Jersey First in overall risk Top 5 for overall commercial,

More information

OFFICE OF THE CITY ADMINISTRATIVE OFFICER

OFFICE OF THE CITY ADMINISTRATIVE OFFICER REPORT from OFFICE OF THE CITY ADMINISTRATIVE OFFICER Date: To: From: December 11, 2015 The Mayor The Council Miguel A. Santana, City Administrative Offio CAO File No. 0220-03695-0188 Council File No.

More information

UTILIZING CANINE TEAMS TO DETECT EXPLOSIVES AND

UTILIZING CANINE TEAMS TO DETECT EXPLOSIVES AND JUNE 24, 2014 UTILIZING CANINE TEAMS TO DETECT EXPLOSIVES AND MITIGATE THREATS U.S. HOUSE OF REPRESENTATIVES, COMMITTEE ON HOMELAND SECURITY, SUBCOMMITTEE ON TRANSPORTATION SECURITY ONE HUNDRED THIRTEENTH

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Moreno, Antonio; Valls, Aïda; Bocio,

More information

ITTA EOD/C-IED TRAINING

ITTA EOD/C-IED TRAINING ITTA EOD/C-IED TRAINING GENERAL SERVICES ADMINISTRATION / FEDERAL SUPPLY SCHEDULE FOR MOBIS FSC GROUP 874 SPECIAL ITEM NUMBERS: 874-1 CONSULTING SERVICES 874-4 INSTRUCTOR LED TRAINING / COURSE DEVELOPMENT

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction [National Security Presidential Directives -17] HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4 Unclassified version December 2002 Subject: National Strategy to Combat Weapons of Mass Destruction "The gravest

More information

SIA PROPRIETARY NOTE: All speaker comments are off-therecord and not for public release

SIA PROPRIETARY NOTE: All speaker comments are off-therecord and not for public release NOTE: All speaker comments are off-therecord and not for public release Export Control Reform Initiative (ECRI) President Obama initiated a comprehensive review of the US export control system in 2009

More information

MISSION STATEMENT THE SHIELD PROGRAM HANOVER CRIME TREND AWARENESS. Volume 1 / Issue 8 Monthly Newsletter January 12, 2017

MISSION STATEMENT THE SHIELD PROGRAM HANOVER CRIME TREND AWARENESS. Volume 1 / Issue 8 Monthly Newsletter January 12, 2017 Volume 1 / Issue 8 Monthly Newsletter January 12, 2017 MISSION STATEMENT Through community and multiagency partnerships: receive, analyze, and develop meaningful intelligence to counter crime and extremism

More information

WM 04 Conference, February 29- March 4, 2004, Tucson, AZ THE DEPARTMENT OF ENERGY S HOMELAND DEFENSE EQUIPMENT REUSE PROGRAM

WM 04 Conference, February 29- March 4, 2004, Tucson, AZ THE DEPARTMENT OF ENERGY S HOMELAND DEFENSE EQUIPMENT REUSE PROGRAM THE DEPARTMENT OF ENERGY S HOMELAND DEFENSE EQUIPMENT REUSE PROGRAM R. W. Meehan Department of Energy - Oak Ridge Operations C. M. R. Goddard Frankie Friend and Associates ABSTRACT In the aftermath of

More information

San Francisco Bay Area

San Francisco Bay Area San Francisco Bay Area PREVENTIVE RADIOLOGICAL AND NUCLEAR DETECTION REGIONAL PROGRAM STRATEGY Revision 0 DRAFT 20 October 2014 Please send any comments regarding this document to: Chemical, Biological,

More information

SECRETARY OF THE ARMY WASHINGTON

SECRETARY OF THE ARMY WASHINGTON SECRETARY OF THE ARMY WASHINGTON 3 1 JUL 2013 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2013-18 (Army Insider Threat Program) 1. References: a. Presidential Memorandum (National Insider Threat

More information

Capital Offence June www orld.com.cbrnew

Capital Offence June www orld.com.cbrnew Major General Jeffrey Buchanan, commander Joint Force Headquarters, National Capital Region, (JFHQ NCR) tells Gwyn Winfield about preparing Washington DC for attack GW: What are JFHQNCR s roles in a CBRN

More information

Mississippi Emergency Support Function #13 Public Safety and Security Annex

Mississippi Emergency Support Function #13 Public Safety and Security Annex Mississippi Emergency Support Function #13 Public Safety and Security Annex ESF #13 Coordinator Mississippi Department of Public Safety Primary Agencies Mississippi Department of Public Safety Mississippi

More information

National Resource and Technical Assistance Center for Improving Law Enforcement Investigations

National Resource and Technical Assistance Center for Improving Law Enforcement Investigations Readers to Enhance Criminal Investigations Assistant Chief of Police Travis Martinez Redlands Police Department Introduction With the vast majority of crimes involving the use of motor vehicles, law enforcement

More information

6 th Annual Joint Civil & DoD CBRN Symposium

6 th Annual Joint Civil & DoD CBRN Symposium Defense Strategies Institute professional educational forum: 6 th Annual Joint Civil & DoD CBRN Symposium ~ Advancing a Government Wide Approach to CBRN Defense, Readiness & Response ~ March 5-6, 2018

More information

San Diego Operational Area. Policy # 9A Effective Date: 9/1/14 Pages 8. Active Shooter / MCI (AS/MCI) PURPOSE

San Diego Operational Area. Policy # 9A Effective Date: 9/1/14 Pages 8. Active Shooter / MCI (AS/MCI) PURPOSE PURPOSE The intent of this Policy is to provide direction for performance of the correct intervention, at the correct time, in order to stabilize and prevent death from readily treatable injuries in the

More information

Defending the Homeland: The Role of the Alaskan Command

Defending the Homeland: The Role of the Alaskan Command NCTR Annual Convention Defending the Homeland: The Role of the Alaskan Command A L A S K A N A C O M M N D Lt Gen Howie Chandler Commander, Alaskan Command, Alaskan North American Aerospace Defense Command

More information

ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS

ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS Homeland Security Chapter 375-X-2 ALABAMA DEPARTMENT OF HOMELAND SECURITY ADMINISTRATIVE CODE CHAPTER 375-X-2 DUTIES AND RESPONSIBILITIES OF ASSISTANT DIRECTORS TABLE OF CONTENTS 375-X-2-.01 375-X-2-.02

More information

STOCKTON POLICE DEPARTMENT GENERAL ORDER DOWNED AIRPLANES SUBJECT

STOCKTON POLICE DEPARTMENT GENERAL ORDER DOWNED AIRPLANES SUBJECT STOCKTON POLICE DEPARTMENT GENERAL ORDER DOWNED AIRPLANES SUBJECT DATE: March 1, 2005 NO: FROM: CHIEF ERIC JONES TO: ALL PERSONNEL INDEX: Airplane Crashes Procedure for Plane Crashes Landing of Aircraft

More information

Engineer Doctrine. Update

Engineer Doctrine. Update Engineer Doctrine Update By Lieutenant Colonel Edward R. Lefler and Mr. Les R. Hell This article provides an update to the Engineer Regiment on doctrinal publications. Significant content changes due to

More information

Cyber Defense: Securing Military Systems And Critical Civilian Infrastructure From An Electronic 9/11 By Sidney E. Dean Editor READ ONLINE

Cyber Defense: Securing Military Systems And Critical Civilian Infrastructure From An Electronic 9/11 By Sidney E. Dean Editor READ ONLINE Cyber Defense: Securing Military Systems And Critical Civilian Infrastructure From An Electronic 9/11 By Sidney E. Dean Editor READ ONLINE If you are searched for the ebook Cyber Defense: Securing Military

More information

Funding Resources for. Your Community s. Communications Project. Grants Information Provided by:

Funding Resources for. Your Community s. Communications Project. Grants Information Provided by: Funding Resources for Your Community s Communications Project Grants Information Provided by: www.grantsoffice.com 2008 Grants Office, LLC All Rights Reserved Funding Resources for Your Community s Communications

More information

Pomona Police Department, California CRIME FIGHTING BLUEPRINT

Pomona Police Department, California CRIME FIGHTING BLUEPRINT Pomona Police Department, California CRIME FIGHTING BLUEPRINT Fiscal Year 2014-2015 LEADERSHIP MESSAGE FROM THE CHIEF OF POLICE Dear Friends, MEASURES During this last year your Police Department was faced

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5525.14 March 22, 2011 USD(P&R) SUBJECT: DoD Law Enforcement Officers (LEOs) Flying Armed References: See Enclosure 1 1. PURPOSE. This Instruction establishes policy,

More information

BioWatch Overview. Current Operations Future Autonomous Detection. June 25, 2013 Michael V. Walter, Ph.D.

BioWatch Overview. Current Operations Future Autonomous Detection. June 25, 2013 Michael V. Walter, Ph.D. BioWatch Overview Current Operations Future Autonomous Detection June 25, 2013 Michael V. Walter, Ph.D. Detection Branch Chief and BioWatch Program Manager Office of Health Affairs Department of Homeland

More information

Intelligence Analysis for Homeland Security RPAD 557/CEHC 557

Intelligence Analysis for Homeland Security RPAD 557/CEHC 557 Intelligence Analysis for Homeland Security RPAD 557/CEHC 557 Instructor: James E. Steiner, PhD Public Service Professor Director, Homeland Security Programs Rockefeller College SUNY Albany 518-708-4183

More information

United States Army. Criminal Investigation Command. Hunting The Hackers CCIU Detectives Deliver Digital Justice

United States Army. Criminal Investigation Command. Hunting The Hackers CCIU Detectives Deliver Digital Justice United States Army Criminal Investigation Command Media contact: 571-305-4041 FOR IMMEDIATE RELEASE Hunting The Hackers CCIU Detectives Deliver Digital Justice By Colby Hauser CID Public Affairs QUANTICO,

More information

Modelling Missions of Light Forces

Modelling Missions of Light Forces Modelling Missions of Light Forces Karl A. Bertsche Defence and Civil Systems Domier GmbH Friedrichshafen Germany Postal Address: 88039 FriedrichshafedGermany E-mail address: bertsche.karl@domier.dasa.de

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5525.14 March 22, 2011 Incorporating Change 2, Effective June 29, 2018 USD(P&R)USD(I) SUBJECT: DoD Law Enforcement Officers (LEOs) Flying Armed References: See

More information

Name of Instructor(s): Byron Boston Days/Hours of Course Proposed: 3 Days/24 Training Hours

Name of Instructor(s): Byron Boston Days/Hours of Course Proposed: 3 Days/24 Training Hours Ontario Association of Police Educators Name of Instructor(s): Byron Boston Days/Hours of Course Proposed: 3 Days/24 Training Hours Byron Boston SYLLABUS SURVEY Course Description: Mexican Drug Trafficking

More information

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19 HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 19 COMBATING TERRORIST USE OF EXPLOSIVES IN THE UNITED STATES FEBRUARY 12, 2007 Purpose (1) This directive establishes a national policy, calls for the development

More information

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018

SACT s remarks to UN ambassadors and military advisors from NATO countries. New York City, 18 Apr 2018 NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION SACT s remarks to UN ambassadors and military advisors from NATO countries New York City, 18 Apr 2018 Général d armée aérienne

More information

MEDICAL_MAS: an Agent-Based System for Medical Diagnosis

MEDICAL_MAS: an Agent-Based System for Medical Diagnosis MEDICAL_MAS: an Agent-Based System for Medical Diagnosis University Petroleum-Gas of Ploiesti, Department of Informatics, Bdul Bucuresti Nr. 39, Ploiesti, 100680, Romania Abstract The paper describes an

More information

Office of University Programs (OUP) Webinar: Funding Opportunity Announcement for the Coastal Resilience Center of Excellence Center Lead

Office of University Programs (OUP) Webinar: Funding Opportunity Announcement for the Coastal Resilience Center of Excellence Center Lead Office of University Programs (OUP) Webinar: Funding Opportunity Announcement for the Coastal Resilience Center of Excellence Center Lead Date Science and Technology Directorate May 2014 www.hsuniversityprograms.org

More information

John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University.

John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University. John R. Harrald, Ph.D. Director, Institute for Crisis, Disaster, and Risk Management The George Washington University Testimony for the Senate Homeland Security Government Affairs Committee Hurricane Katrina:

More information

DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002

DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002 DEPARTMENT OF HOMELAND SECURITY REORGANIZATION PLAN November 25, 2002 Introduction This Reorganization Plan is submitted pursuant to Section 1502 of the Department of Homeland Security Act of 2002 ( the

More information

Mississippi Emergency Support Function #10 Oil and Hazardous Materials

Mississippi Emergency Support Function #10 Oil and Hazardous Materials Emergency Support Function #10 Oil and Hazardous Materials ESF #10 Coordinator Department of Environmental Quality Primary Agencies Department of Environmental Quality State Department of Health/Division

More information

Teacher Assessment Blueprint

Teacher Assessment Blueprint Teacher Assessment Blueprint Homeland Security PA Test Code: 5990 // Version: 01 1 Copyright 2015 2015. NOCTI. All Rights All Rights Reserved. Reserved. General Assessment Information Blueprint Contents

More information

IAD Quick Facts Dulles Security Approach TSA Operational Assets IAD Partnerships Elements of Security Risk-Based Security (RBS) Screening Personnel,

IAD Quick Facts Dulles Security Approach TSA Operational Assets IAD Partnerships Elements of Security Risk-Based Security (RBS) Screening Personnel, 1 IAD Quick Facts Dulles Security Approach TSA Operational Assets IAD Partnerships Elements of Security Risk-Based Security (RBS) Screening Personnel, Equipment, Programs Training BDA Program Compliance

More information

Integrating CBR components within a Case-Based Planner

Integrating CBR components within a Case-Based Planner From: AAAI Technical Report WS-98-15. Compilation copyright 1998, AAAI (www.aaai.org). All rights reserved. Integrating CBR components within a Case-Based Planner David B. Leake and Andrew Kinley Computer

More information

Navy Expeditionary Combat Command Executing Navy s Maritime Strategy

Navy Expeditionary Combat Command Executing Navy s Maritime Strategy Navy Expeditionary Combat Command Executing Navy s Maritime Strategy RADM Mark Handley NDIA 15 th Annual Expeditionary Warfare Conference 6 OCT 2010 THIS BRIEF CLASSIFIED: UNCLASS Overview Riverine Maritime

More information

Metro Transit Police Department Riders Advisory Council Meeting September 21, 2011

Metro Transit Police Department Riders Advisory Council Meeting September 21, 2011 Metro Transit Police Department Riders Advisory Council Meeting September 21, 2011 Chief Michael Taborn Metro Transit Police Department 1 Metro Transit Police Department MISSION The mission of the Metro

More information

SEPTEMBER 11 ATTACKS

SEPTEMBER 11 ATTACKS Social Studies/United States History/September 11 SEPTEMBER 11 ATTACKS On the morning of September 11, 2001, the United States of America suffered a terrorist attack. It was the worst attack in the nation

More information

EVERGREEN IV: STRATEGIC NEEDS

EVERGREEN IV: STRATEGIC NEEDS United States Coast Guard Headquarters Office of Strategic Analysis 9/1/ UNITED STATES COAST GUARD Emerging Policy Staff Evergreen Foresight Program The Program The Coast Guard Evergreen Program provides

More information

Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement

Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement Detecting Nuclear Weapons and Radiological Materials: How Effective Is Available Technology? Opening Statement of Mr. Vayl Oxford Acting Director Domestic Nuclear Detection Office Department of Homeland

More information

January 18, CDT Comments on CCTV: Developing Best Practices Docket No. DHS Submitted via

January 18, CDT Comments on CCTV: Developing Best Practices Docket No. DHS Submitted via January 18, 2008 CDT Comments on CCTV: Developing Best Practices Docket No. DHS-2007-0076 Submitted via privacyworkshop@dhs.gov As the December 17-18, 2007 workshop on Closed Circuit Television (CCTV)

More information

Fighter/ Attack Inventory

Fighter/ Attack Inventory Fighter/ Attack Fighter/ Attack A-0A: 30 Grounded 208 27.3 8,386 979 984 A-0C: 5 Grounded 48 27. 9,274 979 984 F-5A: 39 Restricted 39 30.7 6,66 975 98 F-5B: 5 Restricted 5 30.9 7,054 976 978 F-5C: 7 Grounded,

More information

Department of Homeland Security Needs Under Secretary for Policy

Department of Homeland Security Needs Under Secretary for Policy Department of Homeland Security Needs Under Secretary for Policy James Jay Carafano, Ph.D., Richard Weitz, Ph.D., and Alane Kochems Unlike the Department of Defense (DoD), the Department of Homeland Security

More information

GREGORY A. SCOVEL. Work Experience Bent Creek Terrace Leesburg, VA (703)

GREGORY A. SCOVEL. Work Experience Bent Creek Terrace Leesburg, VA (703) GREGORY A. SCOVEL 42799 Bent Creek Terrace Leesburg, VA 20176 (703) 859-0486 gascovel@gmail.com More than 31 years of experience in the Naval Criminal Investigative Service (NCIS), which produced a significant

More information

Frameworks for Responses to Armed Attack Situations

Frameworks for Responses to Armed Attack Situations Section 2 Frameworks for Responses to Armed Attack Situations It is of utmost importance for the national government to establish a national response framework as a basis for an SDF operational structure

More information

Annual Report 2015 Japan's Actions against Piracy off the Coast of Somalia and in the Gulf of Aden

Annual Report 2015 Japan's Actions against Piracy off the Coast of Somalia and in the Gulf of Aden March 2016 The Cabinet Secretariat The Government of Japan 1 Annual Report 2015 Japan's Actions against Piracy off the Coast of Somalia and in the Gulf of Aden Somalia and the Surroundings (off the Coast

More information

WHICH KIND OF STEM PIONEER ARE YOU?

WHICH KIND OF STEM PIONEER ARE YOU? You might have heard a lot of people talking about STEM lately. In short, STEM is an acronym that stands for four main educational disciplines: science, technology, engineering and math. Eighty percent

More information

OGDEN POLICE DEPARTMENT STRATEGIC PLAN

OGDEN POLICE DEPARTMENT STRATEGIC PLAN OGDEN POLICE DEPARTMENT STRATEGIC PLAN To discuss the strategic plan for the Ogden Police Department. The Ogden Police Department will provide information about its newly developed strategic plan. The

More information

Office for Bombing Prevention Bomb Threat Management

Office for Bombing Prevention Bomb Threat Management Bomb Threat Management FOR OFFICIAL USE ONLY Rev: B 1 Second level Third level Fourth level Fifth level Homeland Security Presidential Directive-19 Homeland Security Presidential Directive 19: Establishes

More information

C4I System Solutions.

C4I System Solutions. www.aselsan.com.tr C4I SYSTEM SOLUTIONS Information dominance is the key enabler for the commanders for making accurate and faster decisions. C4I systems support the commander in situational awareness,

More information

Joint Task Force. significant. supporting. the event

Joint Task Force. significant. supporting. the event Joint Task Force RNC The 2008 Republican National Convention showcased the Minnesota National Guard s capability to support civil authorities. With augmentation from all branches of military service, the

More information

Global Annual Subway Ridership 1. Tokyo billion 2. Moscow billion 3. Seoul billion 4. New York City 1.

Global Annual Subway Ridership 1. Tokyo billion 2. Moscow billion 3. Seoul billion 4. New York City 1. Background New York City Subways and Buses is comprised of two agencies of the MTA regional transportation network MTA NYC Transit and MTA Bus. The regional network also includes MTA Staten Island Railway,

More information

ABSTRACT INTRODUCTION

ABSTRACT INTRODUCTION Designing the Global Threat Reduction Initiative s Nuclear Security Education Program C. M. Marianno, W. S. Charlton, A. R. Contreras, K. Unlu, R. C. Lanza, G. E. Kohse ABSTRACT As part of the National

More information

AMERICAN ASSOCIATION OF PORT AUTHORITIES Duke Street Alexandria, VA Phone: (703) Fax: (703)

AMERICAN ASSOCIATION OF PORT AUTHORITIES Duke Street Alexandria, VA Phone: (703) Fax: (703) AMERICAN ASSOCIATION OF PORT AUTHORITIES 1010 Duke Street Alexandria, VA 22314 Phone: (703) 684-5700 Fax: (703) 684-6321 Kurt J. Nagle, President On behalf of the American Association of Port Authorities

More information

Risk themes from ATAM data: preliminary results

Risk themes from ATAM data: preliminary results Pittsburgh, PA 15213-3890 Risk themes from ATAM data: preliminary results Len Bass Rod Nord Bill Wood Software Engineering Institute Sponsored by the U.S. Department of Defense 2006 by Carnegie Mellon

More information

Federal Law Enforcement

Federal Law Enforcement Federal Law Enforcement Federal Law Enforcement A Primer second edition Jeff Bumgarner Charles Crawford Ronald Burns Carolina Academic Press Durham, North Carolina Copyright 2018 Carolina Academic Press,

More information

APPENDIX: FUNCTIONAL COMMUNITIES Last Updated: 21 December 2015

APPENDIX: FUNCTIONAL COMMUNITIES Last Updated: 21 December 2015 FUNCTIONAL Acquisition APPENDIX: FUNCTIONAL COMMUNITIES Last Updated: 21 December 2015 ROLE Plans for, develops, and procures everything from initial spare parts to complete weapons and support systems,

More information

OPNET Drug Fund. Mission Statement: Functions: Long Term Goals: Page 1 of 5

OPNET Drug Fund. Mission Statement: Functions: Long Term Goals: Page 1 of 5 OPNET Drug Fund Mission Statement: The mission of the Olympic Peninsula Narcotics Enforcement Team is to target drug violators that have an impact on our communities and to reduce drug availability and

More information

INTRADEPARTMENTAL CORRESPONDENCE. The Honorable Board of Police Commissioners

INTRADEPARTMENTAL CORRESPONDENCE. The Honorable Board of Police Commissioners INTRADEPARTMENTAL CORRESPONDENCE September 13, 2010 1.10 TO: The Honorable Board of Police Commissioners FROM: Chief of Police SUBJECT: APPROVAL OF DONATION RECOMMENDED ACTION That the Board of Police

More information

A Call to the Future

A Call to the Future A Call to the Future The New Air Force Strategic Framework America s Airmen are amazing. Even after more than two decades of nonstop combat operations, they continue to rise to every challenge put before

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY United States Department of Homeland Security Homeland Security Advisory System Increased to Orange for Mass Transit and Passenger Rail July 7, 2005 ATTENTION: Federal Departments and Agencies, State Homeland

More information

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 3: Advanced Technology Development (ATD) COST ($ in Millions) Prior

More information

INTRODUCTION AGENCY ROLES AND LEGAL REFERENCES

INTRODUCTION AGENCY ROLES AND LEGAL REFERENCES Last revised 8/18110 AGREEMENT regarding joint field investigations following a criminal or suspected bioterrorist incident between the San Francisco Department of Public Health located at 101 Grove Street,

More information

M.Khaliq Division of Nuclear Security

M.Khaliq Division of Nuclear Security IAEA Guidance: Overview of the Design Basis Threat (DBT) Methodology and Integration in the Nuclear Security Series M.Khaliq Division of Nuclear Security International Workshop on the Lessons Learned from

More information

Managing Homeland Security: PUAD 637 Department of Public and International Affairs Fall Semester 2011

Managing Homeland Security: PUAD 637 Department of Public and International Affairs Fall Semester 2011 Managing Homeland Security: PUAD 637 Department of Public and International Affairs Fall Semester 2011 Instructor: Professor Conant Phone: (703)-993-1416 Office: Robinson A221 email: jconant@gmu.edu Office

More information

SM Agent Technology For Human Operator Modelling

SM Agent Technology For Human Operator Modelling SM Agent Technology For Human Operator Modelling Mario Selvestrel 1 ; Evan Harris 1 ; Gokhan Ibal 2 1 KESEM International Mario.Selvestrel@kesem.com.au; Evan.Harris@kesem.com.au 2 Air Operations Division,

More information

United States Coast Guard

United States Coast Guard A Preview of the United States Coast Guard Cyber Strategy Rutgers University March 2015 Vice Admiral Chuck Michel The Evolving Threat Agenda Adversarial Examples Threat Actors Policies, Directives, and

More information