SlideShare una empresa de Scribd logo
1 de 56
Keeping U.S. Intelligence Effective:
  The Need for a Revolution in
       Intelligence Affairs
Intelligence & 9/11
• 9/11 perceived as an intelligence failure

• Many studies, government reports, books, and
  articles published concerning the need for
  intelligence reform
   – “Connecting the dots”


• Many reform initiatives have not produced the
  desired results
• My research experience
   –   2000-2005: National Intelligence Council (NIC) Project
   –   2003-2004: Future of the Internet Project
   –   2005: Landscapes Project
   –   2005-2006: Future of Intelligence Analysis Project
   –   2005-2010: IC Centers of Academic Excellence
• Ideal vantage point for thinking about the kinds
  of problems facing the U.S. intelligence enterprise
• Heard the term “RIA” mentioned during a
  meeting
Published March 2011
Revolutions
• Periodically occur in all areas of human endeavor
  when conditions change so significantly that
  traditional methods of doing business are
  rendered obsolete
• Examples
  –   Information Revolution
  –   The Revolution in Military Affairs
  –   Biotechnical Revolution
  –   An Islamist Revolution?
• Revolutions are important!
  – New winners and losers
Recognizing Revolutions
• Four questions (from Eliot Cohen, “A Revolution in Warfare,” Foreign
   Affairs (March/April 1996)
     1) Will emerging developments in military affairs
        change the appearance of combat?
     2) Will these developments change the structure of
        armies?
     3) Will they lead to the rise of new military elites?
     4) Will they alter countries’ power positions?

• To the extent answers are “yes,” a Revolution in
  Military Affairs was occurring.
Cohen’s Conclusion
“Reflection on each of these *four questions+
  suggests that this is the eve of a far-reaching
  change in warfare whose outlines are only
  dimly visible but real nonetheless. (emphasis
  added)”

  - Eliot Cohen, “A Revolution in Warfare,”
  Foreign Affairs 75/2 (March/April 1996).
Testing for an RIA
• Four questions (adapted from Cohen’s RMA
  questions)
   1. Will developments in the intelligence enterprise
      change how intelligence is developed and used
      (process)?
   2. Will developments change the structure of the U.S.
      intelligence community (structure)?
   3. Will developments lead to the rise of new elites in
      the intelligence community (skill sets)?
   4. Will developments significantly effect the national
      security of countries that fail to embrace them
      (effect)?
Structure
            COLD WAR                            TODAY
•Single major threat              •Many threats
•Threats are states               •Threats are states, nonstate
                                  actors, global trends…
•Emphasis on learning secrets     •Emphasis on solving mysteries
                                  and learning secrets
•Emphasis on technical means      •Emphasis on human intelligence
•Most information classified      •Open source revolution
•Greatest danger is large scale   •Greatest danger is small scale
nuclear attack                    attack by terrorists with WMDs
•Intelligence used for national   •Intelligence used for national,
security                          regional & global security
Process
          COLD WAR                             TODAY
•Most $$ to technical collection   More $$ to human collection
agencies
•Nature of threat gave most $$     Nature of threat requires more
to DoD                             $$ to non-DoD agencies
•Each agency had clear mission     New missions don’t fit old
                                   structure
•Need for information security     Need for extensive knowledge
fostered stovepiping               sharing
Skill Sets
          COLD WAR                            TODAY
•Knowledge is power: keep it to   •Knowledge sharing is power
yourself
•Technology the concern of        •Everyone must understand
well-defined organizations and    certain technologies, both to
personnel                         analyze issues and to conduct
                                  day-to-day operations
An RIA is Needed
• The answer to all four questions is “yes.” An RIA
  appears to be needed (but is not yet occurring)

   – The intelligence process should change.

   – The organizational structure to support the process should
     change.

   – Future elites in the intelligence community should possess
     new skills.

   – Failure to adapt will have serious consequences.
Mapping the RIA
• Thomas Kuhn and The Structure of Scientific
  Revolutions (first edition by University of Chicago Press, 1962)
   – Paradigms and paradigm shifts
• Must first map the current or “traditional”
  intelligence paradigm
   – Solving puzzles using secret information
       • Puzzles have answers (as opposed to mysteries)
   – All raw intelligence obtained through SIGINT,
     GEOINT, MASINT, HUMINT, and OSINT
Intelligence Requirements in Today’s
        Security Environment
• North Korea
• Iran, China, and other functioning states
• Pakistan, Afghanistan, Congo, Somalia, & other
  failing or failed states
• Al Qaeda and other transnational terrorist groups
• HIV/AIDS, Avian Flu, SARS and other Infectious
  Diseases
• Biopathogens
A New Intelligence Paradigm
• New paradigm must include the old one. Both must
  function without creating “destructive interference.”

• New paradigm must solve puzzles, mysteries, and
  “adaptive interpretations.”

• Adaptive interpretations apply to transnational
  issues/threats
   – SIGINT, GEOINT, MASINT, HUMINT, and OSINT not
     sufficient – need new category of “trusted” information as
     well as classified and open source information
   – Transnational threats require transnational solutions
Conclusions
• Many intelligence reforms have not met expectations
  because they clash with the traditional paradigm.
   – Bureaucratic inertia & immersion in traditional paradigm
   – Competing needs, such as information sharing vs. security
     concerns
• The traditional paradigm remains necessary, but it is not
  sufficient to keep U.S. intelligence effective.
• A Revolution in Intelligence Affairs is needed.
   – Actors that embrace the RIA will gain advantages over those
     that continue with traditional practices
• Information flows and new collection methods are at the
  heart of the RIA. Analytic techniques must change
  accordingly.
Public Health and
Homeland Security
Badolato Distinguished Speakers Series
         Towson University
           April 29, 2011
Public Health Today
              Population Based Care
•   Violence Prevention                   • Terrorism
•   MRSA                                       –   Chemical
•   Smallpox                                   –   Biological
                                               –   Nuclear
•   Chagus Disease
                                               –   Radiological Dispersion
•   West Nile Virus
•   Pandemic/Avian Flu
•   Obesity
•   Disaster Preparedness
•   Health Disparities

         http://www.whatispublichealth.org/impact/today.html
Public Health
• Public health assessments
• Information sharing
• Triage priorities from a public health
  perspective
• Casualty distribution – knowledge of
  resources, development of procedures
• Disaster preparedness- public motivation
(Landesman et al., 2003, p. 4)
Federal Legislation
• Homeland Security Act of 2002
  – Homeland Security Presidential Directive 5
     •   National
     •   Government & Private Sectors
     •   Crisis and consequence
     •   DHS Secretary to manage incidents
     •   Rubin & Harrald (2006)
  – National Response Plan
  – National Incident Management System
Shared Responsibility
• National Culture of Preparedness(Pres. George W. Bush, 5 OCT 2007)


• National Strategy for Homeland Security
  – All levels of government
  – Private sector
  – Communities
  – All citizens
Community Preparedness Activities
• Citizen Corps
  – The mission of Citizen Corps is to harness the power of every individual through
    education, training, and volunteer service to make communities safer, stronger, and
    better prepared to respond to the threats of terrorism, crime, public health issues, and
    disasters of all kinds. http://www.citizencorps.gov/about/

• Medical Reserve Corps
  – The mission of the MRC is to engage volunteers to strengthen public health, emergency
    response and community resiliency. http://www.medicalreservecorps.gov/About

• National Disaster Medical System
  – It is the mission of the National Disaster Medical System to temporarily supplement
    Federal, Tribal, State and Local capabilities by funding, organizing, training, equipping,
    deploying and sustaining a specialized and focused range of public health and medical
    capabilities. http://www.phe.gov/preparedness/responders/ndms/Pages/default.aspx
Towson University’s MRC
                 Baltimore
                  County
                  Health
                Department



             10th Medical
              Regiment
              (Military-
  Maryland
  Defense
             based MRC)       Towson
                             University
   Force
Towson University – Thinking Outside
•   Students, faculty, staff, community
•   Partner agencies
•   Education and drills
•   Student education
    – Integrated Homeland Security Management
       • Off campus student projects
    – College of Health Professions
       • Department of Nursing: On and off campus activities
TU, Students, and Community
• Student Projects with IHSM 633 (Disaster
  Response and Community Health)
  – Disaster plan in Dunbar High School*
  – Disaster plan in a church in northern Japan*
  – Disaster notification plan in a community
  – Education for rural older adults in W. VA.
  – Disaster preparedness for an at-risk population in West
    Baltimore
  – Disaster plan for the Baltimore City Public Safety Center
  – Disaster education at Johns Hopkins Hospital*
  – Disaster preparedness at a senior center on Long Island
  *Places where disasters occurred after our planning.
TU, Students, and Community

• Projects within the Department of Nursing’s
  Graduate Program
  – Disaster education with the Bykota Senior Center
  – Disaster education with the Our Lady of Grace
    Parish’s Youth Theater Group
  – Disaster education in a local elementary school in
    Baltimore City
Emergency Preparedness Drill


                       Thanks to Dr. Agley
                       for the graphics!
Tornado on Campus
Situation: Tornado on York Rd from I-695 to Baltimore City. Campus affected, multiple
casualties, local authorities overwhelmed, MDDF deployed in Burdick Hall.




                    Dr. Alves, ED Physician & Dr. Ogle, Nursing Faculty
Nursing Student & Our Lady of Grace Actors
Nursing Students & Our Lady of Grace Actors
Our Lady of Grace Actors and a Mom
Maryland National Guard: Support and Education
Nursing Students and MDDF Chaplain
Evacuation Education at Towson Center
MDDF, Best Ambulance, Nursing Students
                                                  Some numbers:
                                                  •1000 people
                                                  •Close to 400
                                                   Nursing students
                                                  •Faculty
                                                        •Nursing
                                                        •Health Science
                                                        •Education
                                                  •Community partners
                                                  •Military partners
                                                  •State agencies
                                                  •Children from 11
                                                  different school districts
                                                  •Students from campus
                                                  •Seniors from Bykota
                                                   Senior Center
Public Health Planning, Preparedness, Education
Simulation to Real Time Public Health Issue: Flu!
References
•   Rubin, C. B., & Harrald, J. R. (2006). National response plan, the national incident management system,
    and the federal response plan. In D. G. Kamien (Ed.). The McGraw-Hill homeland security handbook (pp.
    677-688). New York, NY: McGraw-Hill.
•   Landesman, L. Y., Malilay, J., Bissel, R. J., et al.,Becker, S. M., Roberts, L., & Ascher, M. S. (2003). Roles
    and responsibilities of public health in disaster preparedness and response. In L. F. Novick, J. S. Marr (Eds.).
    Public health issues in disaster preparedness: Focus on bioterrorism (pp. 1-56). Sudbury, MA: Jones and
    Bartlett.
•   Homeland Security Council. (2007). National strategy for homeland security. Retrieved from
    http://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf
The Economics of
Homeland Security

    Daraius Irani
The Department of Homeland Security
 The Department of Homeland Security
The Department of Homeland Security
             The Department of Homeland Security
                                           Sept. 11th, 2001 Terrorist attacks
                                           against the U.S. at the World Trade
2002
                                           Center and the Pentagon


              Nov. 25th, 2002 President Bush signs the Homeland Security Act creating
              the DHS. The department will come to employ more than 190,000
              people
2003
              March 1st, 2003 22 existing agencies from other cabinet
              level departments are merged together form the first DHS

              2003 Creation of The Bureau of Customs and Border Protection
              focus on security at and between the ports-of-entry along the
              border
              2003 Formation of The Bureau of Immigration and Customs
              Enforcement. Presently employs more than 20,000 people and
              is the 2nd largest investigative agency in the Federal Government
                                                                                  DHS.gov
Original Agencies
        Many existing agencies were merged to form the DHS
                      The largest of which are:
• The U.S. Customs Service         •   Office for Domestic
  (Treasury)                           Preparedness (Justice)
• The Immigration and              •   The Federal Emergency
  Naturalization Service (Justice)     Management Agency (FEMA)
• The Transportation Security •        National Domestic
  Administration                       Preparedness Office (FBI)
  (Transportation)                 •   U.S. Coast Guard
• Federal Law Enforcement              (Transportation)
  Training Center (Treasury)       •   U.S. Secret Service (Treasury)

                                                                        DHS.gov
DHS Directives

•    Border and Transportation Security
•    Protection of Critical Infrastructure
•    Emergency Preparedness and Response
•    Domestic Counterterrorism
•    Intelligence and Warning
•    Defense Against Catastrophic Threats
                        2010 Budget Distribution                          Intel.

                  Border and                       Protection   Emerg Dom
            Transportation Security                 of Infra.   Prep. Count.



0%         20%             40%           60%                80%                100%
                                                                                      FAS.org
DHS Employment and Budget

                                  200                                                                                                                                  60
National Employment (Thousands)




                                  180
                                  160                                                                                                                                  50




                                                                                                                                                                            Billions of Dollars
                                  140                                                                                                                                  40
                                  120
                                  100                                                                                                                                  30
                                   80
                                   60                                                                                                                                  20
                                   40                                                                                                                                  10
                                   20
                                    0                                                                                                                                  0
                                                                                   2001
                                        1995
                                               1996
                                                      1997
                                                              1998
                                                                     1999
                                                                            2000


                                                                                          2002
                                                                                                 2003
                                                                                                        2004
                                                                                                               2005
                                                                                                                      2006
                                                                                                                             2007
                                                                                                                                    2008
                                                                                                                                           2009
                                                                                                                                                  2010
                                                                                                                                                         2011
                                                                                                                                                                2012
                                                             National Employment in Thousands by DHS
                                                             Billion of budget $
                                                                                                                                                                                    OPM and DHS
Before and After DHS Formation


       Spending on       % of nominal   Private sector        Private sector
Year
       Homeland Security GDP            labor inputs          capital inputs


2001   $56 Billion       0.55           $26.5B                $9.4B

2005   $99.5 Billion     0.80           $28.7B                $16.6 B




                                                         Federal Reserve Bank of New York
Industry Growth as a Result of DHS

• Chemical, biological, and radiological detection
• Border, rail, seaport, industrial, and nuclear plant
  security
• Computer and human resources experts
• Boat manufacturers for the Coast Guard
• Information and integrated technology
  companies
• Management consulting firms

                                                   USA Today
THE DEPARTMENT OF HOMELAND SECURITY AND MARYLAND
DHS Employment
              20,000                                        4,500
              18,000                                        4,000
              16,000                                        3,500




                                                                    MD and VA Levels
              14,000                                        3,000
D.C. Levels




              12,000
                                                            2,500
              10,000
                                                            2,000
               8,000
               6,000                                        1,500
               4,000                                        1,000
               2,000                                        500
                   0                                        0



                          DC    Virginia   Maryland

                                                      OPM Employment Cubes
RESI Analysis of DHS Impacts on Maryland 2002-2010


Employment

  Direct                  Indirect             Induced             Total
                 1,481                  684               4,480                  6,645


Labor Income
  Direct                  Indirect             Induced             Total
           $35,602,852           $31,937,779        $184,041,219           $251,581,852


Value Added to GDP
   Total
           $340,800,185
Maryland Procurement from DHS

Procurement Contracts in 2009:
• $14,559,856,536 (U.S. total)
• $1,674,925,917 (Maryland total)
• 12% (Maryland share of U.S. total)

Salaries and Wages in 2008:
• $12,333,918,562 (U.S. total)
• $255,569,717 (Maryland total)
• 2.1% (Maryland share of U.S. total)


                                           ChooseMaryland.org
Top 10 FY2010 DHS Contractors
Rank               Vendor Name                 Dollars Obligated
 1      International Business Systems (IBM)    $557,280,986

 2         Lockheed Martin Corporation          $427,791,355
 3               Unisys Corporation             $400,757,376
 4        Science Applications International    $347,251,403
                    Corporation
 5        Bollinger Shipyards Lockport, LLC     $322,491,842
 6         Computer Sciences Corporation        $311,479,779
 7     General Dynamics Advanced Information    $311,304,859
                     Systems
 8            Booz Allen Hamilton Inc.          $244,373,784
 9        L-3 Communications Corporation        $236,877,693
 10             The Boeing Company              $207,544,578
                                                       Government Security News 2011
Maryland Higher Education

Multi-year awards ranging between $10 million
 to $18 million

• Behavioral and sociological aspects of
  terrorism at the University of Maryland

• High consequence event preparedness and
  response at Johns Hopkins

                                                FAS.org
DHS AND CYBER SECURITY
Information Technology in Maryland
• From 2009-2014 government spending is
  expected to grow:
  3.5% per year in general IT
  8.1% a year in cyber security

• IT Employment Growth (2001-2008)
  - Maryland: +3.3%
  - National Average: -17.1%

• Computing Services in Maryland
  +7.2% employment increase in mid-recession 2009
     - Highest growth rate in the nation

                                          Maryland Department of Business & Economic Development
Cyber Security and Maryland




                              UMBC
                       Maryland Department of Business & Economic Developmen
Federal Cyber Security Employment In Maryland

Military Installation           =1000 employees




                                 Maryland Department of Business & Economic Development

Más contenido relacionado

La actualidad más candente

Should the United Nations (UN) Convention on Human Rights be Applied more Rig...
Should the United Nations (UN) Convention on Human Rights be Applied more Rig...Should the United Nations (UN) Convention on Human Rights be Applied more Rig...
Should the United Nations (UN) Convention on Human Rights be Applied more Rig...OlakunleOlafeso
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 r2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 rRobert David Steele Vivas
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpowerNoelle Cowling
 
Real-Time Processing of Social Media Content for Social Good
Real-Time Processing of Social Media Content for Social GoodReal-Time Processing of Social Media Content for Social Good
Real-Time Processing of Social Media Content for Social GoodMuhammad Imran
 
NSA Journal of Information Warfare
NSA Journal of Information WarfareNSA Journal of Information Warfare
NSA Journal of Information WarfareDavid Sweigert
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
 

La actualidad más candente (8)

Should the United Nations (UN) Convention on Human Rights be Applied more Rig...
Should the United Nations (UN) Convention on Human Rights be Applied more Rig...Should the United Nations (UN) Convention on Human Rights be Applied more Rig...
Should the United Nations (UN) Convention on Human Rights be Applied more Rig...
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 r2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 r
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpower
 
Real-Time Processing of Social Media Content for Social Good
Real-Time Processing of Social Media Content for Social GoodReal-Time Processing of Social Media Content for Social Good
Real-Time Processing of Social Media Content for Social Good
 
NSA Journal of Information Warfare
NSA Journal of Information WarfareNSA Journal of Information Warfare
NSA Journal of Information Warfare
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 

Similar a Badolato April 2011 Slideshow

Leadership for Justice Peace Safety and Security
Leadership for Justice Peace Safety and SecurityLeadership for Justice Peace Safety and Security
Leadership for Justice Peace Safety and SecurityErwin Schwella
 
Ethics of Emerging Technologies Soldier Enhancement
Ethics of Emerging Technologies  Soldier EnhancementEthics of Emerging Technologies  Soldier Enhancement
Ethics of Emerging Technologies Soldier EnhancementIlya Klabukov
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
VOST Teams: Dispatchers of the Future?
VOST Teams: Dispatchers of the Future?VOST Teams: Dispatchers of the Future?
VOST Teams: Dispatchers of the Future?Cheryl Bledsoe
 
Crisis Information Management: A Primer
Crisis Information Management: A PrimerCrisis Information Management: A Primer
Crisis Information Management: A PrimerSanjana Hattotuwa
 
Crisis Information Management: A Primer
Crisis Information Management: A PrimerCrisis Information Management: A Primer
Crisis Information Management: A PrimerLUCA School of Arts
 
17 disaster response
17 disaster response17 disaster response
17 disaster responseDon Thompson
 
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGYNATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGYTANKO AHMED fwc
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of InformationFiona Beals
 
Presentation final
Presentation finalPresentation final
Presentation finalwaynetp
 
Steele @ Yale ON INTELLIGENCE -- Spies, Lies, & Knowing
Steele @ Yale ON INTELLIGENCE -- Spies, Lies, & KnowingSteele @ Yale ON INTELLIGENCE -- Spies, Lies, & Knowing
Steele @ Yale ON INTELLIGENCE -- Spies, Lies, & KnowingRobert David Steele Vivas
 
Hospital Communications - Need for a New Theoretical Approach
Hospital Communications - Need for a New Theoretical ApproachHospital Communications - Need for a New Theoretical Approach
Hospital Communications - Need for a New Theoretical Approacharunkeepan
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the FutureDr. Lydia Kostopoulos
 
Partner Insights FAO Risk Communication Seminar
Partner Insights FAO Risk Communication SeminarPartner Insights FAO Risk Communication Seminar
Partner Insights FAO Risk Communication SeminarCsdi Initiative
 

Similar a Badolato April 2011 Slideshow (20)

Leadership for Justice Peace Safety and Security
Leadership for Justice Peace Safety and SecurityLeadership for Justice Peace Safety and Security
Leadership for Justice Peace Safety and Security
 
Ethics of Emerging Technologies Soldier Enhancement
Ethics of Emerging Technologies  Soldier EnhancementEthics of Emerging Technologies  Soldier Enhancement
Ethics of Emerging Technologies Soldier Enhancement
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
2004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-12004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-1
 
VOST Teams: Dispatchers of the Future?
VOST Teams: Dispatchers of the Future?VOST Teams: Dispatchers of the Future?
VOST Teams: Dispatchers of the Future?
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
Crisis Information Management: A Primer
Crisis Information Management: A PrimerCrisis Information Management: A Primer
Crisis Information Management: A Primer
 
Crisis Information Management: A Primer
Crisis Information Management: A PrimerCrisis Information Management: A Primer
Crisis Information Management: A Primer
 
The Sendai Framework for Action
The Sendai Framework for ActionThe Sendai Framework for Action
The Sendai Framework for Action
 
17 disaster response
17 disaster response17 disaster response
17 disaster response
 
Essential components of a policy problem definition
Essential components of a policy problem definitionEssential components of a policy problem definition
Essential components of a policy problem definition
 
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGYNATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
 
Ethics of Information
Ethics of InformationEthics of Information
Ethics of Information
 
Presentation final
Presentation finalPresentation final
Presentation final
 
2008 earth intelligence network at hope
2008 earth intelligence network at hope2008 earth intelligence network at hope
2008 earth intelligence network at hope
 
Powerpoint 1
Powerpoint 1Powerpoint 1
Powerpoint 1
 
Steele @ Yale ON INTELLIGENCE -- Spies, Lies, & Knowing
Steele @ Yale ON INTELLIGENCE -- Spies, Lies, & KnowingSteele @ Yale ON INTELLIGENCE -- Spies, Lies, & Knowing
Steele @ Yale ON INTELLIGENCE -- Spies, Lies, & Knowing
 
Hospital Communications - Need for a New Theoretical Approach
Hospital Communications - Need for a New Theoretical ApproachHospital Communications - Need for a New Theoretical Approach
Hospital Communications - Need for a New Theoretical Approach
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the Future
 
Partner Insights FAO Risk Communication Seminar
Partner Insights FAO Risk Communication SeminarPartner Insights FAO Risk Communication Seminar
Partner Insights FAO Risk Communication Seminar
 

Más de Towson University's Division of Innovation & Applied Research

Más de Towson University's Division of Innovation & Applied Research (14)

Fall 2012 Badolato Presentation: When Bad Things Happen to Computer Networks
Fall 2012 Badolato Presentation: When Bad Things Happen to Computer NetworksFall 2012 Badolato Presentation: When Bad Things Happen to Computer Networks
Fall 2012 Badolato Presentation: When Bad Things Happen to Computer Networks
 
Economic Outlook Conference 2012: Maryland's Economic Outlook
Economic Outlook Conference 2012: Maryland's Economic OutlookEconomic Outlook Conference 2012: Maryland's Economic Outlook
Economic Outlook Conference 2012: Maryland's Economic Outlook
 
Jenn Lake - Integrated Marketing Team @ Towson University - Baltimore PR Coun...
Jenn Lake - Integrated Marketing Team @ Towson University - Baltimore PR Coun...Jenn Lake - Integrated Marketing Team @ Towson University - Baltimore PR Coun...
Jenn Lake - Integrated Marketing Team @ Towson University - Baltimore PR Coun...
 
Dr. Daraius Irani - Maryland's Economic Outlook Presentation
Dr. Daraius Irani - Maryland's Economic Outlook PresentationDr. Daraius Irani - Maryland's Economic Outlook Presentation
Dr. Daraius Irani - Maryland's Economic Outlook Presentation
 
Fall 2011 EOC - Mark Goldstein's Presentation
Fall 2011 EOC - Mark Goldstein's PresentationFall 2011 EOC - Mark Goldstein's Presentation
Fall 2011 EOC - Mark Goldstein's Presentation
 
Enhancing Maryland’s GIS Inventory
Enhancing Maryland’s GIS InventoryEnhancing Maryland’s GIS Inventory
Enhancing Maryland’s GIS Inventory
 
Dr. Robert Lerman,
Dr. Robert Lerman,Dr. Robert Lerman,
Dr. Robert Lerman,
 
Dr. Robert Lerman Presentation
Dr. Robert Lerman PresentationDr. Robert Lerman Presentation
Dr. Robert Lerman Presentation
 
MD iMap TUgis2011
MD iMap TUgis2011MD iMap TUgis2011
MD iMap TUgis2011
 
GIS Day TUgis2011 Presentation
GIS Day TUgis2011 PresentationGIS Day TUgis2011 Presentation
GIS Day TUgis2011 Presentation
 
GIS Inventory TUgis2011 Presentation
GIS Inventory TUgis2011 PresentationGIS Inventory TUgis2011 Presentation
GIS Inventory TUgis2011 Presentation
 
MD Broadband Map TUgis2011 Presentation
MD Broadband Map TUgis2011 PresentationMD Broadband Map TUgis2011 Presentation
MD Broadband Map TUgis2011 Presentation
 
TEDCO Presentation for 2010 Showcase
TEDCO Presentation for 2010 ShowcaseTEDCO Presentation for 2010 Showcase
TEDCO Presentation for 2010 Showcase
 
MIPS Presentation for 2010 TU Showcase
MIPS Presentation for 2010 TU ShowcaseMIPS Presentation for 2010 TU Showcase
MIPS Presentation for 2010 TU Showcase
 

Último

Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...srinuseo15
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhbhavenpr
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Delhi Call girls
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Tableget joys
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Delhi Call girls
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.pptsammehtumblr
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...hyt3577
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Delhi Call girls
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreiebhavenpr
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)Delhi Call girls
 

Último (20)

Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 

Badolato April 2011 Slideshow

  • 1. Keeping U.S. Intelligence Effective: The Need for a Revolution in Intelligence Affairs
  • 2. Intelligence & 9/11 • 9/11 perceived as an intelligence failure • Many studies, government reports, books, and articles published concerning the need for intelligence reform – “Connecting the dots” • Many reform initiatives have not produced the desired results
  • 3. • My research experience – 2000-2005: National Intelligence Council (NIC) Project – 2003-2004: Future of the Internet Project – 2005: Landscapes Project – 2005-2006: Future of Intelligence Analysis Project – 2005-2010: IC Centers of Academic Excellence • Ideal vantage point for thinking about the kinds of problems facing the U.S. intelligence enterprise • Heard the term “RIA” mentioned during a meeting
  • 5. Revolutions • Periodically occur in all areas of human endeavor when conditions change so significantly that traditional methods of doing business are rendered obsolete • Examples – Information Revolution – The Revolution in Military Affairs – Biotechnical Revolution – An Islamist Revolution? • Revolutions are important! – New winners and losers
  • 6. Recognizing Revolutions • Four questions (from Eliot Cohen, “A Revolution in Warfare,” Foreign Affairs (March/April 1996) 1) Will emerging developments in military affairs change the appearance of combat? 2) Will these developments change the structure of armies? 3) Will they lead to the rise of new military elites? 4) Will they alter countries’ power positions? • To the extent answers are “yes,” a Revolution in Military Affairs was occurring.
  • 7. Cohen’s Conclusion “Reflection on each of these *four questions+ suggests that this is the eve of a far-reaching change in warfare whose outlines are only dimly visible but real nonetheless. (emphasis added)” - Eliot Cohen, “A Revolution in Warfare,” Foreign Affairs 75/2 (March/April 1996).
  • 8. Testing for an RIA • Four questions (adapted from Cohen’s RMA questions) 1. Will developments in the intelligence enterprise change how intelligence is developed and used (process)? 2. Will developments change the structure of the U.S. intelligence community (structure)? 3. Will developments lead to the rise of new elites in the intelligence community (skill sets)? 4. Will developments significantly effect the national security of countries that fail to embrace them (effect)?
  • 9. Structure COLD WAR TODAY •Single major threat •Many threats •Threats are states •Threats are states, nonstate actors, global trends… •Emphasis on learning secrets •Emphasis on solving mysteries and learning secrets •Emphasis on technical means •Emphasis on human intelligence •Most information classified •Open source revolution •Greatest danger is large scale •Greatest danger is small scale nuclear attack attack by terrorists with WMDs •Intelligence used for national •Intelligence used for national, security regional & global security
  • 10. Process COLD WAR TODAY •Most $$ to technical collection More $$ to human collection agencies •Nature of threat gave most $$ Nature of threat requires more to DoD $$ to non-DoD agencies •Each agency had clear mission New missions don’t fit old structure •Need for information security Need for extensive knowledge fostered stovepiping sharing
  • 11. Skill Sets COLD WAR TODAY •Knowledge is power: keep it to •Knowledge sharing is power yourself •Technology the concern of •Everyone must understand well-defined organizations and certain technologies, both to personnel analyze issues and to conduct day-to-day operations
  • 12. An RIA is Needed • The answer to all four questions is “yes.” An RIA appears to be needed (but is not yet occurring) – The intelligence process should change. – The organizational structure to support the process should change. – Future elites in the intelligence community should possess new skills. – Failure to adapt will have serious consequences.
  • 13. Mapping the RIA • Thomas Kuhn and The Structure of Scientific Revolutions (first edition by University of Chicago Press, 1962) – Paradigms and paradigm shifts • Must first map the current or “traditional” intelligence paradigm – Solving puzzles using secret information • Puzzles have answers (as opposed to mysteries) – All raw intelligence obtained through SIGINT, GEOINT, MASINT, HUMINT, and OSINT
  • 14. Intelligence Requirements in Today’s Security Environment • North Korea • Iran, China, and other functioning states • Pakistan, Afghanistan, Congo, Somalia, & other failing or failed states • Al Qaeda and other transnational terrorist groups • HIV/AIDS, Avian Flu, SARS and other Infectious Diseases • Biopathogens
  • 15. A New Intelligence Paradigm • New paradigm must include the old one. Both must function without creating “destructive interference.” • New paradigm must solve puzzles, mysteries, and “adaptive interpretations.” • Adaptive interpretations apply to transnational issues/threats – SIGINT, GEOINT, MASINT, HUMINT, and OSINT not sufficient – need new category of “trusted” information as well as classified and open source information – Transnational threats require transnational solutions
  • 16. Conclusions • Many intelligence reforms have not met expectations because they clash with the traditional paradigm. – Bureaucratic inertia & immersion in traditional paradigm – Competing needs, such as information sharing vs. security concerns • The traditional paradigm remains necessary, but it is not sufficient to keep U.S. intelligence effective. • A Revolution in Intelligence Affairs is needed. – Actors that embrace the RIA will gain advantages over those that continue with traditional practices • Information flows and new collection methods are at the heart of the RIA. Analytic techniques must change accordingly.
  • 17.
  • 18. Public Health and Homeland Security Badolato Distinguished Speakers Series Towson University April 29, 2011
  • 19. Public Health Today Population Based Care • Violence Prevention • Terrorism • MRSA – Chemical • Smallpox – Biological – Nuclear • Chagus Disease – Radiological Dispersion • West Nile Virus • Pandemic/Avian Flu • Obesity • Disaster Preparedness • Health Disparities http://www.whatispublichealth.org/impact/today.html
  • 20. Public Health • Public health assessments • Information sharing • Triage priorities from a public health perspective • Casualty distribution – knowledge of resources, development of procedures • Disaster preparedness- public motivation (Landesman et al., 2003, p. 4)
  • 21. Federal Legislation • Homeland Security Act of 2002 – Homeland Security Presidential Directive 5 • National • Government & Private Sectors • Crisis and consequence • DHS Secretary to manage incidents • Rubin & Harrald (2006) – National Response Plan – National Incident Management System
  • 22. Shared Responsibility • National Culture of Preparedness(Pres. George W. Bush, 5 OCT 2007) • National Strategy for Homeland Security – All levels of government – Private sector – Communities – All citizens
  • 23. Community Preparedness Activities • Citizen Corps – The mission of Citizen Corps is to harness the power of every individual through education, training, and volunteer service to make communities safer, stronger, and better prepared to respond to the threats of terrorism, crime, public health issues, and disasters of all kinds. http://www.citizencorps.gov/about/ • Medical Reserve Corps – The mission of the MRC is to engage volunteers to strengthen public health, emergency response and community resiliency. http://www.medicalreservecorps.gov/About • National Disaster Medical System – It is the mission of the National Disaster Medical System to temporarily supplement Federal, Tribal, State and Local capabilities by funding, organizing, training, equipping, deploying and sustaining a specialized and focused range of public health and medical capabilities. http://www.phe.gov/preparedness/responders/ndms/Pages/default.aspx
  • 24. Towson University’s MRC Baltimore County Health Department 10th Medical Regiment (Military- Maryland Defense based MRC) Towson University Force
  • 25. Towson University – Thinking Outside • Students, faculty, staff, community • Partner agencies • Education and drills • Student education – Integrated Homeland Security Management • Off campus student projects – College of Health Professions • Department of Nursing: On and off campus activities
  • 26. TU, Students, and Community • Student Projects with IHSM 633 (Disaster Response and Community Health) – Disaster plan in Dunbar High School* – Disaster plan in a church in northern Japan* – Disaster notification plan in a community – Education for rural older adults in W. VA. – Disaster preparedness for an at-risk population in West Baltimore – Disaster plan for the Baltimore City Public Safety Center – Disaster education at Johns Hopkins Hospital* – Disaster preparedness at a senior center on Long Island *Places where disasters occurred after our planning.
  • 27. TU, Students, and Community • Projects within the Department of Nursing’s Graduate Program – Disaster education with the Bykota Senior Center – Disaster education with the Our Lady of Grace Parish’s Youth Theater Group – Disaster education in a local elementary school in Baltimore City
  • 28. Emergency Preparedness Drill Thanks to Dr. Agley for the graphics!
  • 29. Tornado on Campus Situation: Tornado on York Rd from I-695 to Baltimore City. Campus affected, multiple casualties, local authorities overwhelmed, MDDF deployed in Burdick Hall. Dr. Alves, ED Physician & Dr. Ogle, Nursing Faculty
  • 30. Nursing Student & Our Lady of Grace Actors
  • 31. Nursing Students & Our Lady of Grace Actors
  • 32. Our Lady of Grace Actors and a Mom
  • 33. Maryland National Guard: Support and Education
  • 34. Nursing Students and MDDF Chaplain
  • 35. Evacuation Education at Towson Center
  • 36. MDDF, Best Ambulance, Nursing Students Some numbers: •1000 people •Close to 400 Nursing students •Faculty •Nursing •Health Science •Education •Community partners •Military partners •State agencies •Children from 11 different school districts •Students from campus •Seniors from Bykota Senior Center Public Health Planning, Preparedness, Education
  • 37. Simulation to Real Time Public Health Issue: Flu!
  • 38. References • Rubin, C. B., & Harrald, J. R. (2006). National response plan, the national incident management system, and the federal response plan. In D. G. Kamien (Ed.). The McGraw-Hill homeland security handbook (pp. 677-688). New York, NY: McGraw-Hill. • Landesman, L. Y., Malilay, J., Bissel, R. J., et al.,Becker, S. M., Roberts, L., & Ascher, M. S. (2003). Roles and responsibilities of public health in disaster preparedness and response. In L. F. Novick, J. S. Marr (Eds.). Public health issues in disaster preparedness: Focus on bioterrorism (pp. 1-56). Sudbury, MA: Jones and Bartlett. • Homeland Security Council. (2007). National strategy for homeland security. Retrieved from http://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf
  • 39. The Economics of Homeland Security Daraius Irani
  • 40. The Department of Homeland Security The Department of Homeland Security
  • 41. The Department of Homeland Security The Department of Homeland Security Sept. 11th, 2001 Terrorist attacks against the U.S. at the World Trade 2002 Center and the Pentagon Nov. 25th, 2002 President Bush signs the Homeland Security Act creating the DHS. The department will come to employ more than 190,000 people 2003 March 1st, 2003 22 existing agencies from other cabinet level departments are merged together form the first DHS 2003 Creation of The Bureau of Customs and Border Protection focus on security at and between the ports-of-entry along the border 2003 Formation of The Bureau of Immigration and Customs Enforcement. Presently employs more than 20,000 people and is the 2nd largest investigative agency in the Federal Government DHS.gov
  • 42. Original Agencies Many existing agencies were merged to form the DHS The largest of which are: • The U.S. Customs Service • Office for Domestic (Treasury) Preparedness (Justice) • The Immigration and • The Federal Emergency Naturalization Service (Justice) Management Agency (FEMA) • The Transportation Security • National Domestic Administration Preparedness Office (FBI) (Transportation) • U.S. Coast Guard • Federal Law Enforcement (Transportation) Training Center (Treasury) • U.S. Secret Service (Treasury) DHS.gov
  • 43. DHS Directives • Border and Transportation Security • Protection of Critical Infrastructure • Emergency Preparedness and Response • Domestic Counterterrorism • Intelligence and Warning • Defense Against Catastrophic Threats 2010 Budget Distribution Intel. Border and Protection Emerg Dom Transportation Security of Infra. Prep. Count. 0% 20% 40% 60% 80% 100% FAS.org
  • 44. DHS Employment and Budget 200 60 National Employment (Thousands) 180 160 50 Billions of Dollars 140 40 120 100 30 80 60 20 40 10 20 0 0 2001 1995 1996 1997 1998 1999 2000 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 National Employment in Thousands by DHS Billion of budget $ OPM and DHS
  • 45. Before and After DHS Formation Spending on % of nominal Private sector Private sector Year Homeland Security GDP labor inputs capital inputs 2001 $56 Billion 0.55 $26.5B $9.4B 2005 $99.5 Billion 0.80 $28.7B $16.6 B Federal Reserve Bank of New York
  • 46. Industry Growth as a Result of DHS • Chemical, biological, and radiological detection • Border, rail, seaport, industrial, and nuclear plant security • Computer and human resources experts • Boat manufacturers for the Coast Guard • Information and integrated technology companies • Management consulting firms USA Today
  • 47. THE DEPARTMENT OF HOMELAND SECURITY AND MARYLAND
  • 48. DHS Employment 20,000 4,500 18,000 4,000 16,000 3,500 MD and VA Levels 14,000 3,000 D.C. Levels 12,000 2,500 10,000 2,000 8,000 6,000 1,500 4,000 1,000 2,000 500 0 0 DC Virginia Maryland OPM Employment Cubes
  • 49. RESI Analysis of DHS Impacts on Maryland 2002-2010 Employment Direct Indirect Induced Total 1,481 684 4,480 6,645 Labor Income Direct Indirect Induced Total $35,602,852 $31,937,779 $184,041,219 $251,581,852 Value Added to GDP Total $340,800,185
  • 50. Maryland Procurement from DHS Procurement Contracts in 2009: • $14,559,856,536 (U.S. total) • $1,674,925,917 (Maryland total) • 12% (Maryland share of U.S. total) Salaries and Wages in 2008: • $12,333,918,562 (U.S. total) • $255,569,717 (Maryland total) • 2.1% (Maryland share of U.S. total) ChooseMaryland.org
  • 51. Top 10 FY2010 DHS Contractors Rank Vendor Name Dollars Obligated 1 International Business Systems (IBM) $557,280,986 2 Lockheed Martin Corporation $427,791,355 3 Unisys Corporation $400,757,376 4 Science Applications International $347,251,403 Corporation 5 Bollinger Shipyards Lockport, LLC $322,491,842 6 Computer Sciences Corporation $311,479,779 7 General Dynamics Advanced Information $311,304,859 Systems 8 Booz Allen Hamilton Inc. $244,373,784 9 L-3 Communications Corporation $236,877,693 10 The Boeing Company $207,544,578 Government Security News 2011
  • 52. Maryland Higher Education Multi-year awards ranging between $10 million to $18 million • Behavioral and sociological aspects of terrorism at the University of Maryland • High consequence event preparedness and response at Johns Hopkins FAS.org
  • 53. DHS AND CYBER SECURITY
  • 54. Information Technology in Maryland • From 2009-2014 government spending is expected to grow: 3.5% per year in general IT 8.1% a year in cyber security • IT Employment Growth (2001-2008) - Maryland: +3.3% - National Average: -17.1% • Computing Services in Maryland +7.2% employment increase in mid-recession 2009 - Highest growth rate in the nation Maryland Department of Business & Economic Development
  • 55. Cyber Security and Maryland UMBC Maryland Department of Business & Economic Developmen
  • 56. Federal Cyber Security Employment In Maryland Military Installation =1000 employees Maryland Department of Business & Economic Development

Notas del editor

  1. ** (Italics for original department)**Departments merged March 1st 2003 At the time expected to be the 2nd largest Cabinet level Dept. Currently the third largest in terms of employment.The Federal Protective ServiceAnimal and Plant Health Inspection Service (part)(Agriculture)Strategic National Stockpile and the National Disaster Medical System (HHS)Nuclear Incident Response Team (Energy)Domestic Emergency Support Teams(Justice)CBRN Countermeasures Programs (Energy)Environmental Measurements Laboratory (Energy)National BW Defense Analysis Center (Defense)Plum Island Animal Disease Center (Agriculture)Federal Computer Incident Response Center (GSA)National Communications System (Defense)National Infrastructure Protection Center (FBI)Energy Security and Assurance Program (Energy)http://www.dhs.gov/xabout/history/editorial_0133.shtm
  2. $45.8 Billion of discretionary budget for these directives.Border and Transportation Security 68%Protection of Infrastructure 13%Emergency Preparedness 7%Companies still have room to grow in areas where the DHS spends the most money which include management support, facilities management, construction, engineering consulting, IT integration, and guard services. Products and Services Relevant to the MarketBorder and Transportation Security: security programs designed to fully integrate homeland security measures into existing domestic transportation systems that promote the efficient and reliable flow of people, goods, and services across borders, while preventing terrorists from using transportation as weapons, or as a means of delivery of harmful goods. Detection and security services.Intelligence and Warning: Intelligence programs and warning systems that can detect terrorist activity before it takes place which include strategies to identify, collect, analyze, and distribute source intelligence information or the resultant warnings from intelligence analysis. Domestic Counterterrorism: incorporates federal funding for any law enforcement programs (including state, local, or regional) that investigate and prosecute criminal activity to prevent terrorist activity within the United States. It includes all homeland security programs that identify, halt, prevent, and prosecute terrorists in the United States.Protecting Critical Infrastructures and Key Assets: Programs that improve protection of the individual pieces and the interconnecting systems that make up our critical infrastructure; funding for programs associated with the physical or cyber security of federal assets. This mission area also includes programs designed to protect America’s key assets, which are those unique facilities, sites, and structures whose disruption or destruction could have significant consequences. Defending Against Catastrophic Threats: homeland security programs that involve protecting against, detecting, deterring, or mitigating the terrorist use of weapons of mass destruction, including understanding terrorists’ efforts to gain access to the expertise, technology, and materials needed to build chemical, biological, radiological, and nuclear (CBRN) weapons. In addition, this mission area includes funding for efforts or planning to decontaminate buildings, facilities, or geographic areas after a catastrophic event. Emergency Preparedness and Response: programs that prepare to minimize the damage and recover from any future terrorist attacks that may occur despite our best efforts at prevention. This area includes programs that help to plan, equip, train, and practice the needed skills of the varied and necessary first responder units, including such groups as police officers, firefighters, emergency medical providers, public works personnel, and emergency management officials.Http://homelandsecuritynewswire.com/robust-homeland-security-market-2010
  3. 9/11/2001 Responsible for a huge spike in Homeland security activity. 100% increase in both Employment and Budget over the two following years. Has been constantly increaseing ever since.DHS http://www.dhs.gov/xabout/budget/OPM http://www.opm.gov/feddata/HistoricalTables/ExecutiveBranchSince1940.asp
  4. In 2001, defense spending on homeland security was $56B (0.55% of nominal GDP) and over a five year period, rose to $99.5B in 2005 (0.80% of GDP) Over the same five year period, private sector security related labor inputs increased from $26.5B to $28.7B and security related capital inputs rose from $9.4B to $16.6BSpending profile does not directly match assumed activities of DHS as border and transportation security and protection of critical infrastructure account for the most DHS spending (65%)while intelligence and warning constitute the least spending (1%) because such expenditures are not directly linked to DHS ______________________________________________________________________________________________________________________In Maryland, particularly in the immediate aftermath of 9/11, defense contracts flooded into the state and kept the state economy going despite 2 million jobs being lost throughout the rest of the country. The Baltimore Sun, November 2, 2003Marketplace forecasts for the global homeland security industry anticipate business will grow from approximately $40 billion in 2004, to nearly $180 billion by 2015. Extra NotesUS companies benefit the most from potential revenues in the security services sectorAbout 70% of private revenue comes from federal, state, and local fundingPrivate sector industries seeking products from security firms (and make up the other 30% in revenue) include:Financial institutionsTransportation Healthcare Communications Energy 2005: DHS awards over $600M in 2 year contracts to Boeing, Magal Security Systems, Oracle, IPIX, and International Microwave Corp Maryland, among other states, continues to seek out private companies to secure its ports. From 2005 through January 2007, government awarded more than $600M in contracts to Boeing, Magal Security Systems, Oracle, IPIX, and International Microwave Corp (a subsidiary of L-3 Communications) to help protect airports, borders, and ports; the majority of the money went to companies that specialize in access control and surveillance. The government does not have active product research and development so this is viewed as the best allocation of resources. “States such as Maryland are soliciting private companies to secure and operate their ports. New York is offering hundreds of thousands of dollars to companies that can safeguard public water supplies.”
  5. http://www.usatoday.com/money/industries/2006-09-10-security-industry_x.htm
  6. *= Pre-Department of Homeland Security years. Numbers from an aggregate of the agencies that would be eventually combined to create the DHSLarge Spike in Employment in MD and VA after 9-11-2001FEMA 2005-2007 Maryland drop in employment caused by the restructuring of FEMA 2005-2007http://www.fedscope.opm.gov/employment.asp
  7. 2002-2010 totals from DHS employment in MD and commuters from MD to D.C.Does not encompass effects of any federal procurement.
  8. http://www.choosemaryland.org/factsstats/Documents/Federal%20Facilities/Department%20of%20Homeland%20Security.pdf
  9. FY 2010Of these top ten, Lockheed Martin is the only contractor headquartered in Maryland (Bethesda). But, many of these companies have branches in Maryland.General Dynamics Advanced Information Systems, Science Applications International Corporation, Booz Allen Hamilton, Computer Sciences Corporation are all headquartered in the Virginia suburbs of Washington, DC. However some have labs in Maryland or employ Maryland residents.Which of these companies have branches in Maryland/Employing Marylanders?Lockheed(Bethesda Headquarters)Science Applications International Corporation (Locations: Abingdon, Annapolis, Annapolis Junction, Bethesda, APG, Baltimore, Beltsville, Bowie, Burtonsville, California, Camp Springs, Clinton, College Park, Columbia, Dickerson, Edgewood, Elkridge, Fort Detrick, Ft. Meade, Frederick, Gaithersburg, Germantown, Greenbelt, Indian Head, La Plata, Landover, Lanham, Lexington Park, Linthicum, Patuxent River, Rising Sun, Rockville, Seabrook, Silver Spring, St. Inigoes), General Dynamics (Annapolis Junction), Booz Allen Hamilton (Aberdeen, Annapolis Junction, Baltimore, Frederick, Hanover, Lexington Park, Linthicum, Rockville), L-3 Communications (Easton, Hanover, Linthicum Heights, Millersville), Computer Sciences Corporation (locations in Northern Va. ; possibly employ MD’ers) Boeing(locations in Annapolis junction, and Northern Va. ; possibly employ MD’ers)
  10. http://www.fas.org/sgp/crs/homesec/RS21270.pdf more info in charts on DHS
  11. Maryland is one of only a few states the netted positive growth in the IT field in 2009, as well. From Nov. 2008 to Nov. 2009 Maryland had the highest growth rate of any state in computing services employment, at 7.2%, showing Maryland is fast become a more tech-centered economy. Cyber Security is seeing constant growth within DHS’s National Cyber Security Division. Maryland is more ready than any that is prepared to meet this new demand as it continues to grow. IDG News
  12. The Baltimore- Washington corridor is an obvious cyber security centerAs of 2010, Maryland ranked fourth highest for government procurement money related to cyber security research and production. Maryland is clearly a leader in cyber security innovation and its prime geographical location facilitates the acquisition of DHS contracts from both the military installations in the state and in DC. Maryland ranks highly nationwide in terms of innovation in cyber security companies• 1st in federal research and development obligations on a per capita basis• 2nd in the Milken Institute’s 2008 State Technology and Science Index• 2nd in Federal R&D investment ($12.2 billion)• 2nd in R&D intensity– the ratio of R&D expenditures to gross domesticproduct by state• 3rd highest score in the 2008 State New Economy Index (ITIF 2008)• 7th highest number of computer systems design jobs (57,400) and engineeringservices jobs (32,000)Since Maryland’s power grid is separate from New York’s, it provides a secure location for back-office operations along with easy transportation access to the global markets and a fiber-rich, reliable telecommunications network. http://www.umbc.edu/cyber/documents/DBED_CyberMaryland_1.10_001.pdf
  13. Aberdeen Proving Ground houses the Army’s Communication and Electronics Command (CECOM) and its substantial engineering and research capabilities, which moved here from New Jersey. The U.S. Navy houses the Fleet Cyber Command at Fort Meade.Research from INPUT, a market research firm, estimates the federal IT market alonewas $81 billion in 2008, with projected growth to $98 billion in 2013. The demand forinformation security products and services by the federal government–including civilian,defense and intelligence communities–demand forinformation security will increase from $7.9 billion in 2009 to $11.7 billionin 2014.These military posts play a crucial role in defending homeland security and the increasing reliance on information means these installations are primary users of cyber-security. The state is home to 12 major military installations and four smaller “niche” facilities establishing national security; designing aircraft and energetic systems; testing ordnance weapons, combat vehicles, aircraft, avionics systems;performing biomedical research; providing medical care to the armed forces; and facilitating global telecommunications.Top Maryland Defense IT ContractorsBoeingBooz Allen Hamilton.CACI InternationalComputer Sciences CorporationGeneral Dynamics CorporationHoneywell InternationalIBML3 CommunicationsLockheed Martin CorporationMITRENorthrop Grumman CorporationSAIC