Showing posts with label Homeland Security. Show all posts
Showing posts with label Homeland Security. Show all posts

September 21, 2011

Shalom Rotundus

Rotundus, the rolling robot, was designed by the European Space Agency for exploration of distant planets like Mars and Mercury, but now it has found its way into many earthly avocations.

This Groundbot has "eyes" on either side of its roly-poly robotic body and has a unique internal pendulum for maneuvering around.

Currently, Rotundus is deployed for sentry duty at SAAB auto manufacturing plants.

However, as you can see in the video, it can also function comfortably in a home environment as a quasi baby-sitter for the kids.

Already, we see robots in Japan providing service to people from servers in restaurants to caretakers for the elderly.

I appreciated the interview with the CTO at Rotundus who shares his vision for robots that "provide not only security, but also pleasure to people."

Rotundus is a great example of how robots can come in virtually any way, shape or form.

The key is that robots leverage the best of automation and innovation to help ordinary people do things simpler, easier, and more convenient than ever before.

Share/Save/Bookmark

September 10, 2011

Rising From The Ashes of 9/11

From the smoldering wreckage of the 9/11 attacks, now rises the new World Trade Center (WTC) complex.

According to the Wall Street Journal (10-11 Sept. 2011), the damage from the terrorist attacks of 9/11 resulted in the collapse or partial collapse of 7 buildings including: WTC North Tower, South Tower, and Four, Fix, Six, and Seven WTCs as well the Marriott Hotel. In addition, 11 other surrounding building had major damage including 1, 2, and 3 World Financial Centers and the N.Y.P.D. Command Center.

A decade later, $11 billion has been invested in the reconstruction of the 16 acre site, including $3 billion for One WTC (at 104 stories and 1,776 feet tall)--"making it the most expensive office tower in the U.S.

The cost is being driven upward by enhanced security measures to thwart other potential attacks, and according to Fast Company (Sept. 2011) and the buildings website these include:

1) Safety Materials - Advanced safety materials include dense fireproofing and biochemical filters to protect occupants from spreading threats.

2) Structural Redundancy - Load-bearing structures are being replicated so if there is a failure, "these skyscrapers have steel connections capable of redirecting the path of the upper floors load downward through other structural members." Additionally, the sprinkler system has "two interconnected standpipes, so that if one should fail, the other can compensate."

3) Protected Core - The sprinklers and safety systems (including the buildings communications antennae and ventilation) are being located in a protected inner building concrete core to prevent their being severed or disabled.
4) Escapability - Multiple exits and backups on emergency lighting, wider staircases for escape, separate stairs for first responders, and "lifeboats"--which are elevator escape pods from protected refuge areas on specific floors take evacuees to ground level safety.

I think it is important to recognize and applaud these safety and security enhancements; together, with improvements to our counterterrorism, intelligence, and homeland security operations, we have come a long way.
However, we cannot afford to stop and get complacent with our progress--as we see with the latest security alert, this time for the 10th year anniversary of the 9/11 attack.

In protecting our homeland, we have to get it right every single time, but those who seek to attack us and our way of life, only need to "get it right" once in order to hurt and kill many innocent people.

For 9/11/11, it is a good time to reflect on where we've come, the progress to date, and recommit ourselves to "fight the good fight".

One way to do this, I believe, is through continuing investment and advancement in our technology, science, and engineering platforms. These will help us to strengthen our economy and through innovation and it's application stay ahead or leapfrog those who seek to come against us.
Stronger, safer builders are important (and should of course, be pursued), but we cannot win a war of terror by bunkering down.

Technology and innovation are our offensive weapons that will enable us to keep the enemy on the run--afraid of what we've got up our sleeves next.

(Source Photo: here)

Share/Save/Bookmark

July 23, 2011

Getting To Swift Cyber Justice

Destroyed_computer

The first Department of Defense Strategy for Operating in Cyberspace is out (July 2011).

Of course, like the plans that came before (e.g. Cyberspace Policy Review), it emphasizes the imperative for cyberspace protection. Some highlights:

  • "DoD is particularly concerned with three areas of potential adversarial activity: theft or exploitation of data; disruption or denial or service of access or service..., and the destructive action--including corruption, manipulation, or direct activity that threatens to destroy or degrade network or connected systems."
  • "Cyber threats to U.S. national security go well beyond military targets and affects all aspects of society. Hackers and foreign governments are increasingly able to launch sophisticated intrusions into the networks and systems that control civilian infrastructure."
  • "Every year, an amount of intellectual property larger than that contained in the Library of Congress is stolen from networks maintained by U.S. businesses, universities, and government departments and agencies."

The strategies for cyberspace protection in the DoD plan include treating cyberspace as an operational domain; innovation; partnership; and so on. But we need to leverage our strengths even more.

As the Wall Street Journal pointed out on 15 July 2011: "The plan as described fails to engage on the hard issues, such as offense and attribution." If we can't even identify who's attacking us, and fight back with precision, then we're flailing.

Some may express the concern that we would have all-out war by attacking those who attack us. However, what is the alternative besides confronting our aggressors?

The concept of operations is straightforward: Any computer device that is used to attack us, would immediately be blocked and countered with equivalent or greater force and taken out of play.

This would mean that we are able to get past cyber-bot armies to the root computers that are initiating and controlling them, and dealing with them decisively. This would hold regardless of the source of the attack--individual or nation-state.

The DoD plan acknowledges our own unpreparedness: "Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity."

As in the Cold War, there must be no doubt with Cyber Warfare (as with nuclear) of our ability to inflict devastating second-strike or preemptive attacks with deadly precision.

Until we have unambiguous hunter-killer capability to identify and locate perpetrators of cyber attacks against us and the ability to impose swift justice, we are at the mercy of our aggressors.

We can only have peace in cyberspace when we have the strength to stand up and defend it.

Now we must move with cyber speed to build this capability and stand ready to execute our defenses.

Admiral Mike Mullen was quoted this week (18 July 2011) in Federal Times as saying: "The single biggest existential threat that's out there is cyber...It's a space that has no boundaries. It has no rules."

We must become even better--much better!

(Source Photo: here)

Share/Save/Bookmark

July 10, 2011

When Free Speech Goes Afoul

Fire_theater

Freedom of speech is one of our most precious rights.

However, there are limits - times when the right to speak and publish comes up against the principle that one should not cause harm to others.

The famous example is that you cannot falsely cry, "Fire!" in a crowded theater.

Free speech--yes; harm to others--no.

This week (11-17, July 2011), a BusinessWeek article called "Set Them Free" exemplifies what can happen when free speech goes too far.

The article is an argument in favor of illegal immigration.

The author's thesis is stated in the form of a rhetorical question: "Laws against illegal immigration make little economic or moral sense. So why punish the brave citizen who break them?"

Certainly, I am sympathetic to newcomers to our land. I come from a family of immigrants, like so many American citizens, and I value the opportunities and freedom this country has provided to me and my family.

However, in this article, the author openly promotes breaking the law. He supports "illegal" immigration and calls for others to facilitate it.

One can argue about economics and morality of immigration policy, but from my perspective, obviously, no country can have fully open borders. Logically, this helps to ensure safety, security, and social order. Coming up on the 10-year "anniversary" of the events of 9/11, this is a no-brainer.

I therefore have trouble believing that Bloomberg would publish an article essentially calling for an end to border security. Any arguments regarding economic benefit do not detract from the clear negative implications for national security. (Note: all opinions my own.)

Not only does the article ignore this point, but it brazenly calls the laws against illegal immigration "immoral."

The author stretches the limits of free speech beyond the breaking point in my view, when he recklessly states: "When a law itself prohibits doing the right thing, when it is immoral rather than just annoying or inconvenient, and when breaking the law does no great harm to any others, it is justifiable for people of conscience to chose to break that law."

He literally states that illegal immigration is "the right thing (!)"

How can a mainstream media source publish such extremist rhetoric, even going so far as to compare the U.S. laws to apartheid: "Current, U.S. immigration laws have all the moral standing of pass laws in apartheid South Africa."

In addition to teaching us that free speech can be misused to spread extremism, hatred, lies, promote civil disobedience, and enable chaos, there are some other unfortunate lessons here.

The first is that one must think critically about what one reads, even if it is in a supposedly "mass media" publication. For immigration is a blessing and a privilege, but not an entitlement. Nobody has the right to enter another country's borders at will, without restriction.

Second, and more troubling, extremist thinking clearly continues to flourish not only outside our borders, but from fanatics within.

While I agree that we should always be moral, help those in need, and make good economic decisions, this does not negate the importance of maintaining security and social order. Further, it is irresponsible at the very least to promote breaking the law, and offensive to compare illegal immigration as an issue of economic exploitation to the drastic human rights abuses of apartheid South Africa.

(Source Photo: here)

Share/Save/Bookmark

June 25, 2011

Busting The Organizational Bunkers

There is a law in Switzerland that every citizen has to have quick access to a bomb shelter and that all new residences be outfitted with these.

According to the Wall Street Journal (25-26 June 2011), there are over 300,000 swiss bunkers with enough room "to shelter all 7.6 million citizens" and with 1 million to spare!

Yet, the Swiss continue to add 50,000 new spots a year in the bomb shelters.

Note, these are not just a proverbial hole in the wall shelter, but bomb bunkers able to withstand the "impact of a 12-megaton explosion at a distance of [only] 700 meters (765 yards)"--this is 800 times the energy discharged in the bombing of Hiroshima!

So the Swiss are very serious about sheltering themselves.

According to Swiss Info Channel, this preoccupation began in the 1960s with fear of nuclear attack and soviet invasion. Hence the slogan at the time, "Neutrality is no guarantee against radioactivity."

Despite the high cost of these shelters and the end of the Cold War, the Swiss hold dear to their shelters to protect against the variety of new dangers out there from terrorist's dirty bombs to nuclear/chemical/biological accidents, and natural disasters--and the recent events with Fukushima only served to reinforce those beliefs.

The WSJ points out, preparedness comes "second nature" to them--they popularized the Swiss pocket knife, they still have a mandatory military draft for men, and aside from the U.S. and Yemen, they have more guns per capita than anyone else out there.

I find their obsession with security fascinating, especially since they are a neutral country and haven't had a major conflict for about 200 years.

Perhaps, the Swiss as a small country surrounded by Germany, France, Italy, and Austria that were pummeled in World Wars I and II, witnessed enough bloodshed to be forever changed.

It reminds me of organizations with defective cultures, where employees see others beaten down so often and so long, they simply learn to keep their mouths shut and their heads down. They have in a sense learned to "shelter in place."

Of course, being prepared to duck when something is thrown at you is a good thing, but when you are perpetually stuck in a ducking stance, then something is wrong.

I admire the Swiss and the Israeli's propensity to prepare and survive, when they are the David's amidst the Goliath's.

However, in an organizational context, I am concerned when I see so many employees hiding in shelters, afraid to speak up and contribute, because they have been marginalized by broken organization cultures.

The organization is not the place for bunkers, it is the place for collaboration and productivity.

(All opinions my own)

(Photo Source: Facts Worth Knowing)

Share/Save/Bookmark

June 5, 2011

Video Surveillance Made Easier

One of the big problems with video surveillance is that even the most alert security team can be lulled by fatigue and boredom into missing critical events and details on the closed-circuit television (CCTV).

Now there is a new technology called BriefCam (founded in 2007) from Hebrew University in Israel that summarizes hours of video in brief minutes.

What differentiates this new technology, according to The Economist (15 February 2011) is that rather than fast-forwarding or using motion detection to capture or select images, BriefCam captures everything, but "creates a summary of all moving events and play back a synopsis...not speeded up, each person moves at their actual pace. And at any time during the review an operator can switch [click-on the time stamp of the event of interest] to see the original video footage."

BriefCam creates like a time warp where "all moving events from the period of interest are collected and shifted in time to create the synopsis."

Essentially objects are overlaid on a timeless background, so you are seeing them occur simultaneously, each with a timestamp that can be selected and clicked to isolate the event.

What makes this an incredible forensic tool, is that there are controls for speed and density of what you watching, and for even moving objects out of the way on the screen.

The Chairman of BriefCam explains, "We don't try to replace human eyes, we just report what we see so that it is more comprehensible."

This is particularly helpful since according to CNBC (July 2010), which awarded BriefCam as number 2 of Europe's 25 Most Creative Companies, noted "the average person viewing surveillance footage has an effective attention span of about [only] 20 minutes."

This is why BriefCam can help our law enforcement and security personnel overcome the traditional video surveillance issues that the Wall Street Journal (27 September 2010) put as "there's not enough time and manpower to watch it all." This is one reason that the WSJ awarded BriefCam their 2010 Innovation Award.

Potential customers for this physical security technology includes police, homeland security, military, as well as commercial customers.

This is a very promising technology tool that with the addition or integration of recognition software and metadata tagging can help us monitor and safeguard our borders, streets, and critical infrastructure.

Share/Save/Bookmark

April 16, 2011

Wake Up To Advanced Technology


Yet another air traffic controller asleep on the job today--OMG.
Everyone is upset--as they should be--safety and lives are at stake.

Hello.

Come in...

Is anyone down there?

We need to land.

We have an emergency on board (someone is sick or perhaps the plane is in imminent danger or maybe it's been hijacked).

I guess we need to call back later.

That's CRAZY!

Silence is not golden, in these cases.

In the government (as in private sector control rooms), there are a lot of round the clock duty stations--watching our airports, our borders, and critical infrastructure.

We rely on people to be alert for any problems and be prepared to step up to the plate to take necessary action to safeguard our nation.

When people are "asleep at the switch," they are not only abrogating their basic duty (for which they are getting paid), but they are endangering others and this is obviously unacceptable.

We know this intuitively.

Why has this gotten so out of control lately--Is this a new phenomenon or just one that is coming to light now? Are people taking advantage of the system, genuinely exhausted, or disillusioned with their jobs and giving up--so to say?

There are a lot of questions that need to be explored and answered here and I would expect that these answers will be forthcoming.

Because it is not just a matter of reacting with a doubling of the shift or clamping down on the people involved--although that maybe a good first step to stop the proverbial bleeding; but obviously more needs to be done.

For decades, air traffic control (ATC) has relied on controllers on the ground to guide planes on the ground and in the air, despite new technologies from autopilot to Global Positioning System (GPS) and from on-board transponders to advanced cockpit displays.

Many hardworking government and commercial sector employees have been working to change this through modernization of the processes and systems over the years.

By increasingly leveraging advances in technology, we can do more of what people--like the ATCs and many other of our hardworking watchstanders--are currently being asked to do manually.

This doesn't mean that there is no human (AWAKE! is the expectation) watching to make sure that everything is working properly, but it does mean that the people may be in some instances an augmentation, rather than the primary doers.

In the end, people have got be in control, but technology should be doing as much of the heavy lifting as it can for us and perhaps, as we are a failsafe for technology, technology can in some instances be a backstop for human error and frailty.

It doesn't make us weak to admit our limitations and look not only for people and process changes, but also for technology solutions to help augment our personal capabilities.

(Credit Picture: PN.PsychiatryOnline.org)

Share/Save/Bookmark

October 8, 2010

You’ve Got An Alert

You’re all probably familiar with the capability of signing up for alerts to your computer or mobile device (phone, blackberry, pager, PDA, etc.).

By signing up, you can get notifications about severe weather (such as tornados or earthquacks), transportation troubles (such as street closures or metro incidents), utility disruptions (water, telephone, or power), government and school closings, Amber alerts, or breaking news and information on major crisis (such as homeland security or other emergency situations).

Unfortunately, not everyone bothers to sign up for these. Perhaps, they don’t want to bother registering for another site, giving and maintaining their personal contact information, or maybe they just prefer to rely on major news sources like CNN or social networking sites like Twitter for getting the word out.

The problem is that in a real crisis situation where time is of the essence and every minute and second counts—envision that tornado swooping in or that ticking time bomb about to go off—we need to let people know no matter what they are doing—ASAP!

According to GovTech (October 2010), the California Emergency Management Agency is planning to deploy a new system called Commercial Mobile Alert System (CMAS) to “deliver warnings and safety information via text alerts to wireless phones in specified areas without requiring individuals to subscribe to the service.”

A pilot is scheduled to begin in San Diego in the fall.

With CMAS, emergency information can be targeted to an area affected and transmitted to everyone in the receiving area without them having to do anything. Just like your televisions receiving the emerging alerts (which is great if you happen to be watching), now your mobile devices will get them too.

I remember hearing the stories from my father about World War II how the German Luftwaffe (air force) would blitz (i.e. carpet bomb) London and other Ally cities, and the sirens would go off, blaring to give the people the chance to take cover and save their lives.

Well, thank G-d, we don’t often hear any air raid sirens like that anymore, and with CMAS having the potential to someday grow into a full national network of wireless emergency alerts, we may never have to hear sirens like that again.

(Photo: Courtesy Oak Ridge National Laboratory Emergency Management Center; http://communication.howstuffworks.com/how-emergency-notifications-work1.htm)


Share/Save/Bookmark

April 4, 2010

Advanced Biometrics for Law Enforcement

Homeland Security Today Magazine (March 2010) has an interesting article called “Biometrics on the Battlefield" about how the American military has had significant success in Afghanistan taking biometrics and in using it for “vetting, tracking, and identification.”

Here’s how it’s done:

The biometrics system uses HIIDE (Handheld Interagency Identity Detection System) devices, which is “similar in size to a large camera, [that] connects directly to the BATS [Biometrics Automated Tool Set] database and matches inputs against a biometrics watch list of 10,000 individuals.”

The database “BATS uses a combination of fingerprints, photographs and iris scans, in addition to an in-depth background examination” to “screen potential local employees, identify detainees, and differentiate friendly individuals from insurgents and terrorists.”

How successful has the use of biometrics been?

“The use of biometrics has clearly thwarted security breaches and helped prevent unwanted activities by the enemy. Additionally, in 2008 alone, hundreds of HVTs (high value targets) were identified through the use of this biometrics technology.”

The article suggests the application of this biometric system for domestic law enforcement use.

Currently, fingerprint cards or stationary scanners are common, but with the proposed military biometrics system, there is the technology potential to use mobile scanning devices quickly and easily in the field.

The article gives the example: “if an officer came into contact with an individual under suspect conditions, a simple scan of the iris would ascertain that person’s status as a convicted felon, convicted violent felon, convicted sex offender or someone on whom an alert has been placed.”

In this scenario, quicker and more accurate identification of suspects could not only aid in dealing with dangerous offenders and benefit the officers in terms of their personal safety, but also contribute to ensuring community safety and security through enhanced enforcement capabilities.

Of course, using such a system for law enforcement would have to pass legal muster including applicable privacy concerns, but as the author, Godfrey Garner, a retired special forces officer, states “hopefully, this valuable technology will be recognized and properly utilized to protect law enforcement officer in the United States. I know that I’ve seen it protect our sons and daughters on the battlefields of Afghanistan.”

We are living in an amazing time of technology advances, and the potential to save lives and increase public safety and security through lawful use of biometrics is a hopeful advancement for all.


Share/Save/Bookmark

March 31, 2010

Balancing Freedom and Security

There is a new vision for security technology that blends high-tech with behavioral psychology, so that we can seemingly read people’s minds as to their intentions to do harm or not.

There was a fascinating article (8 January 2010) by AP via Fox News called “Mind-Reading Systems Could Change Air Security.”

One Israeli-based company, WeCU (Read as we see you) Technologies “projects images onto airport screen, such as symbols associated with a certain terrorist group or some other image only a would be terrorist would recognize.”

Then hidden cameras and sensors monitoring the airport pickup on human reactions such as “darting eyes, increased heartbeats, nervous twitches, faster breathing,” or rising body temperature.

According to the article, a more subtle version of this technology called Future Attribute Screening Technology (FAST) is being tested by The Department of Homeland Security—either travelers can be passively scanned as they walk through security or when they are pulled aside for additional screening are subjected to “a battery of tests, including scans of facial movements and pupil dilation, for signs of deception. Small platforms similar to balancing boards…would help detect fidgeting.”

The new security technology combined with behavioral psychology aims to detect those who harbor ill will through the “display of involuntary physiological reactions that others—such as those stressed out for ordinary reasons, such as being late for a plane—don’t.”

While the technology married to psychology is potentially a potent mix for detecting terrorists or criminals, there are various concerns about the trend with this, such as:

1) Becoming Big Brother—As we tighten up the monitoring of people, are we becoming an Orwellian society, where surveillance is ubiquitious?

2) Targeting “Precrimes”—Are we moving toward a future like the movie Minority Report, where people are under fire just thinking about breaking the law?

3) Profiling—How do we protect against discriminatory profiling, but ensure reasonable scanning?

4) Hardships—Will additional security scanning, searches, and interrogations cause delays and inconvenience to travelers?

5) Privacy—At what point are we infringing on people’s privacy and being overly intrusive?

As a society, we are learning to balance the need for security with safeguarding our freedoms and fundamental rights. Certainly, we don’t want to trade our democratic ideals and the value we place on our core humanity for a totalitarianism state with rigid social controls. Yet, at the same time, we want to live in peace and security, and must commit to stopping those with bad intentions from doing us harm.

The duality of security and freedom that we value and desire for ourselves and our children will no doubt arouse continued angst as we must balance the two. However, with high-technology solutions supported by sound behavioral psychology and maybe most importantly, good common sense, we can continue to advance our ability to live in a free and secure world—where “we have our cake and eat it too.”


Share/Save/Bookmark

January 9, 2010

Architecting A Secure Society

Once again, we are confronted with the basic security question of how much is the right amount?

It’s a classic catch-22 that requires us to architect security to meet opposing ends: we expect security to be as much as necessary to stop the terrorists, but as little as possible to ensure efficient travel and trade and maintain people’s privacy and equality.

In the last decades, we have behaved schizophrenically, calling for more security every time there is an attempted attack, only to withdraw and demand greater privacy protections, speedier security processing, and only random checks when things cool down.

The Wall Street Journal reported in the January 9-10, 2010 edition that the U.S.’s handling of security nowadays is an ever-losing proposition. The article calls it a virtual game of “Terrorball,” in which we cannot win, because there only two perpetual rules:

· “The game lasts as long as there are terrorists who want to harm Americans; and

· If terrorists should manage to kill or injure or seriously frighten any of us, they win.”

Based on the above, I believe that we can only win the game by changing its rules. Rather than being reactive to every terror scare, we are prepared with one approach—one that delivers an optimal level of security based on the current level of risk.

I recall when Michael Chertoff was Secretary of Homeland Security. During that time, he was a strong advocate for a risk-based approach that was multilayered, strong yet flexible enough to accommodate changing circumstances. From that perspective, which I think made a lot of sense: security decisions are made on the basis of objective criteria. These include technical feasibility, maximum effect, cost-benefit analysis, and so on.

A risk-based approach, or what I call “optimal security,” clearly makes a lot of sense. Yet it is tempting, when a security situation actually occurs, to let emotions get the better of us. On the one extreme, sometimes hysteria takes place and everybody seems a potential threat. Other times, we get angry that anyone at all is subjected to scrutiny or questioning.

In order to save the most lives and change the terror game, we have to decide to become more rational about the threat that faces us. This doesn’t mean being cold and calculating, but rather rational and proactive in developing a security architecture and governance that seeks to protect the most with the least negative impacts—but not trying to plug every possible hole at all costs.

In optimal security: sure, there is the ideal where we want to protect every American from every possible threat. However, there is also the reality where, because of competing priorities and scarce resources (to address everything from the deficit, health care, education, social programs, energy, science, defense, and more) we cannot—no matter how much we genuinely want to—prevent every terror instance.

So the terror playbook can and should be transformed. We can recognize there will always be terrorists—enemies of the state—who want to harm us and given enough attempts, no matter how optimal our security, they will occasionally get a sucker punch in on us—and we must be prepared for this. Moreover, rather than “freaking out” about this the terror threat, we can grow and commit to doing the best we can and accepting that we will increase security when information is there to support that need, and we will relax when that becomes possible.

Bottom line: We must move away from hysteria and any other factor that prevents us from being objective and make rational choices to deploy protections that are most effective and simultaneously safeguard our liberty.

“Life, liberty and the pursuit of happiness” captures the security debate well. We want to safeguard lives, but at the same ensure liberty and we want to be happy and not afraid all the time.

To accomplish this balance, our optimal security realization should be based on highly effective intelligence, supported by the very best technology, and a security platform that adjusts to threats in real time.

While our intelligence continues to strengthen and our technology continues to improve, the greatest challenge is our ability as a nation and as individual human beings to cope with the distress caused by terrorism.

We are ambivalent emotionally about the threat and what needs to be done to combat it. However, once we look inside and understand the emotions that this issue raises, and come to terms with reality we face, we will as a nation be more at peace and less likely to jump from one extreme to another in terms of our demands and expectations from those who protect us every day.


Share/Save/Bookmark

June 12, 2009

Future Police Cruiser Architected for Law Enforcement

Carbon Motors E7 Police Car Photoshoot - Douglas Sonders Photography from Douglas Sonders on Vimeo.

Coming in 2012. This new law enforcement vehicle rocks!! 

The first police vehicle architected for the law enforcement end-user (User-centric EA in action). 

"Carbon Motors is a new Atlanta-based automaker that is developing the Carbon E7, the world's first purpose-built law enforcement vehicle that will provide enhanced performance and improved efficiency compared to the off-the-line cars used by today's officers. Automotive engineers from Carbon Motors are collaborating with law enforcement personnel across the country to design a vehicle that is equipped to meet the unique demands of day-to-day patrol operations." (Homeland Defense Journal)

Share/Save/Bookmark

January 17, 2009

Decentralization, Technology, and Anti-Terror Planning

Given that 9/11 represented an attack on geographically concentrated seats of U.S. financial and government power, is it a good enterprise architecture decision to centralize many or all government headquarters in one single geographic area?

Read about Decentralization, Technology, and Anti-Terror Planning in The Total CIO.


Share/Save/Bookmark

Decentralization, Technology, and Anti-Terror Planning

Even though there hasn’t been a successful terrorist attack against the United States since 9/11, we are all aware that terrorists continue to seek ways to harm us. Of course, we have assets deployed nationally as well as internationally to protect our interests. However, there is always more that can be done. And one thing that immediately comes to my mind is decentralization.

The concept of decentralization is very simple. Rather than concentrating all your vital assets in one place, you spread them out so that if one is destroyed, the others remain functional. The terrorists already do this by operating in dispersed “cells.” Not only that, but we know that very often one “cell” doesn’t know what the other one is doing or even who they are. All this to keep the core organization intact in case one part of it is compromised.

Both the public and private sectors understand this and often strategically decentralize and have backup and recovery plans. However, we still physically concentrate the seat of our federal government in a geographically close space. Given that 9/11 represented an attack on geographically concentrated seats of U.S. financial and government power, is it a good enterprise architecture decision to centralize many or all government headquarters in one single geographic area?

On the one hand the rationale for co-locating federal agencies is clear: The physical proximity promotes information-sharing, collaboration, productivity, a concentrated talent pool, and so on. Further, it is a signal to the world that we are a free and proud nation and will not cower before those who threaten us.

Yet on the other hand, technology has advanced to a point where physical proximity, while a nice-to-have, is no longer an imperative to efficient government. With modern telecommunications and the Internet, far more is possible today than ever before in this area. Furthermore, while we have field offices dispersed throughout the country, perhaps having some headquarters outside DC would bring us closer to the citizens we serve.

On balance, I believe that both centralization and decentralization have their merits, but that we need to more fully balance these. To do this, we should explore the potential of decentralization before automatically reverting to the former.

It seems to me that decentralization carries some urgency given the recent report “World At Risk,” by The Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism—it states that “terrorists are determined to attack us again—with weapons of mass destruction if they can. Osama bin Laden has said that obtaining these weapons is a ‘religious duty’ and is reported to have sought to perpetuate another ‘Hiroshima.’

Moreover, the report goes on to state that the commission “believes that unless the world community acts decisively and with great urgency, it is more likely than not that a weapon of mass destruction will be used in a terrorist attack somewhere in the world by the end of 2013.”

Ominously the report states “we know the threat we face. We know our margin of safety is shrinking, not growing. And we know what we must do to counter the risk.”

Enterprise architecture teaches us to carefully vet and make sound investment decisions. Where should we be investing our federal assets—centrally or decentralized and how much in each category?

Obviously, changing the status quo is not cheap and would be especially difficult in the current global economic realty. But it is still something we should carefully consider.


Share/Save/Bookmark

March 18, 2008

Bioterror Sensors and Enterprise Architecture

Since the events of 9/11, America has been widely and deeply broadening its homeland security capabilities. One area that this has been occurring in is in the ability to detect an attack and respond quickly to save lives.

MIT Technology Review, 18 March 2008, reports on a new sensor system that can “detect six potential airborne bioterror agents” within three minutes.

The “new detector uses living cells that light up in the presence of airborne bioterror agents such as anthrax and smallpox” as well as botulinum, ricin and two other bacteria.

“The company selling the sensor, Innovative Biosensors of Rockville, MD, is marketing it for use in airports and other buildings, including laboratories where research on dangerous pathogens is performed.”

“The company has a contract with the U.S. Department of Defense for building security in the Washington, DC area.” And one would imagine that similar precautions are being taken in other major metropolitan areas in the country.

This is serious business and Innovative Biosensors is taking no chances. “The system can run 16 tests simultaneously, one in each chamber of the disc…when at least two chambers are devoted to each pathogen, there are no false positives.”

Certainly, we will continue to mature our homeland defenses. To do this, all agencies involved in homeland security must grow and develop their enterprise architectures. As with the new sensor system, protecting this country cannot be done by human factors alone, but will require ever greater technological sophistication to monitor the “bad guys” and prevent, protect, respond to, and recover from any threats.

Our adversaries will not resist using technology to harm us—whether through improvised explosive devises or attacks on our networks—and we will need every technological advantage we can get to defeat them.

One way to maintain our technology edge is through the rigors of enterprise architecture. This discipline is critical in developing a well thought-out business and technology plan, making sound IT investments, and governing our IT with care and diligence.

While at times it may seem that this great country has limitless resources, the truth is that all resources are finite and we must put those to the best uses, so that the technology we develop and deploy truly enables the mission of protecting this honored country and its noble citizens.


Share/Save/Bookmark

September 29, 2007

24 TV Series and Enterprise Architecture

“24, last year’s most Emmy Award-winning television series with five Emmys, including Outstanding Lead Actor in a Drama Series (Kiefer Sutherland) and Outstanding Drama Series, is one of the most innovative, thrilling and acclaimed drama series on television.” (TV.com)

What makes 24 so thrilling?

Well there is the drama, the intrigue, the ever twisting plot and constant terrorist threats, and of course, Keifer Sutherland and the rest of the 24 team.

There is also the technology and its application to track the terrorists, communicate effectively, and the business intelligence to decipher the terrorist plots. While the technology is not perfect and often it is used by the terrorists to thwart CTU as well, it still comes across quite impressively.

On a Bluetooth technology website, I found this:

“Fox's hit television show ’24’ has always displayed the latest in cutting edge technology.CTU (Counter Terrorist Unit) agents and terrorists alike. But which model of Bluetooth headsets are they actually wearing?” (bluetomorrow.com) During this season (Day 5) of 24, Bluetooth wireless headsets can be seen constantly being used by both

The technology used in 24 is viewed as cutting-edge and trend-setting (i.e. everyone wants to know which model CTU is using).

On another site, Government Computer News, 7 January, 2007, it states: “Federal superspy Jack Bauer battles fate and countless foes on the hit TV show “24”—a drama unfolding in real time and depicted on several windows within the screen. Like the Bauer character, who himself is the fictional successor to an earlier superagent who liked his tipple “shaken, not stirred,” federal IT users frequently will have to share information quickly if they hope to prevail or even survive in 2007.” (http://www.gcn.com/print/26_01/42874-1.html)

Again, the 24 series is viewed as a model for information technology users and IT sharing.

In the same GCN article, Homeland Security Department, G. Guy Thomas, the Coast Guard’s science and technology adviser for the Maritime Domain Awareness Project, states: “The ultimate goal that technologists and policy-makers should strive for is user-definable interfaces, which would provide a ‘common operational picture [COP] that serves as an interface to a collaborative information environment.’”

The COP contains an operational picture of relevant information shared by more than one command and facilitates collaborative planning and assists all echelons to achieve situational awareness. This type of operating picture is often seen being used in CTU to track and ultimately catch (with Bauer’s help) the terrorists.

For Homeland Security enterprise architecture, 24 can serve as a target state forsynthesizing business process and technology. For example, the integration between the business processes and the technology is virtually flawless in CTU, where business intelligence at the Los Angeles office is communicated and made virtually immediately available to the agents in the field for quickly following up on leads and cornering conspirators.

Additionally, even the character Jack Bauer himself displays not only tremendous heroism and patriotism in his efforts to protect this nation and its citizens, but also his innovative and can-do persona is a model for enterprise architecture development of creative yet grounded target technology states and transition plans for our organizations.

Additionally, from a User-centric EA perspective, we need to look outside our agencies at business and technology best practices in the public and private sectors, and yes, even at fictional portrayals. It is even from dramas like 24, and maybe especially from such visionary elements that EA can adapt information, creativity, and innovation to plan a genuine target state for our enterprises.


Share/Save/Bookmark