SlideShare uma empresa Scribd logo
1 de 29
One if by Land, Two if by Sea: Toward a Strategy of Public Warning for Terrorism May 31, 2007 John Fenzel, COL, USA
The Lexington Alert System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Galveston Hurricane of 1900
The Dayton Warning System
 
The Public Warning Imperative ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The AMBER Alert System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
White House Got Early Warning on Katrina By Joby Warrick Washington Post Staff Writer Tuesday, January 24, 2006; A02 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Critiques of the HSAS ,[object Object],[object Object],“ I stay away from that!  Good Luck!”   -Richard A. Clarke
Threats to Effective Warning ,[object Object],[object Object],“ This is more art than science.  We want to ensure we’re achieving the desired effect…that we don’t provide information to terrorists.”   -President Bush
Terror Plot Invokes SIRIUS Alert System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Three Phases of Public Warning ,[object Object],[object Object],[object Object]
Toward a Strategic Framework of Public Warning Time Domestic Public (General) Alert International Targeted (Confidential) Alert Preemption Prevention Mitigation Point  of  Attack Recognition of Incomplete Information Notification of  Threat
Strategic Decision-Making in Warning for Terrorist Threats   Risk Time Preemption Prevention Mitigation Point  of  Attack Recognition of Incomplete Information Notification of  Threat Infiltration within U.S. Borders Targeted  Warnings Expanded  Warnings General Warnings
John Boyd’s OODA Loop Model
 
Fielded Forces Population Infrastructure System Essentials Leadership John Warden’s “Five Rings” System Model
Adapting Warden’s Five Rings Layers of Public Warning U.S. Populace First Responders National Infrastructure National Processes National Leadership
Creating a Strategy of Public Warning for Terrorism Intelligence  and Surveillance Public  Warning Vulnerability  Analysis Prevention Mitigation Preemption Predictive Analysis
Instruments of Warning
Instruments of Public Warning Strategy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Technical Communications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Coordination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Public Warning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Detection/Surveillance Mitigation Prevention Preemption
Orient Act Observe Decide Launch Targeted Warning LOW GUARDED ELEVATED Predictive Analysis: -Intelligence -Surveillance Yes (Attack) Preemption Destroy   Warden’s Five Rings Detection/Notification of Threat International or Domestic Early to Mid Planning Stages Sufficient  Information?  Sufficient Capability? No (Move to Prevention)
Orient Act Observe Decide HIGH Functional Warning Sector-Specific Warning Delay - Disrupt Predictive Analysis: -Incomplete Information -Inadequate Capability Vulnerability Analysis Prevention Notification/Detection of Threat Domestic Infiltration of Terror Cells Advanced Planning Stages Prioritize Objectives Using  Warden’s Five Rings Model Protect Sources and Methods Public Safety Expanded Warning Observe Orient Act Decide
SEVERE HSAS EAS NOAA  Media COOP/COG Domestic Incident Management Mitigation Attack Imminent or in Progress Prioritize the Effort: Warden’s Five Rings Coordinate with Federal, State, Local Authorities and Private Entities General Warning Act Decide Orient Observe
Recommendations… ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Conclusions…

Mais conteúdo relacionado

Mais procurados

Misinformation management-tools
Misinformation management-toolsMisinformation management-tools
Misinformation management-toolsAhmed-Refat Refat
 
The first-ever-infodemilogical-study-1993
The first-ever-infodemilogical-study-1993The first-ever-infodemilogical-study-1993
The first-ever-infodemilogical-study-1993Ahmed-Refat Refat
 
‘Like a Virus’: Disinformation in the Age of COVID-19
‘Like a Virus’: Disinformation in the Age of COVID-19‘Like a Virus’: Disinformation in the Age of COVID-19
‘Like a Virus’: Disinformation in the Age of COVID-19Axel Bruns
 
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckRajeev Chauhan
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document LeAnn Rhodes
 
Modernizing Dept of Homeland Security for CFAA investigations
Modernizing Dept of Homeland Security for CFAA investigationsModernizing Dept of Homeland Security for CFAA investigations
Modernizing Dept of Homeland Security for CFAA investigationsDavid Sweigert
 
Journal of Physical Security 7(1)
Journal of Physical Security 7(1)Journal of Physical Security 7(1)
Journal of Physical Security 7(1)Roger Johnston
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION Valentin Vesa
 
Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsMiriam Fernandez
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesDoing What I Do
 
Hsl Capstone Project J
Hsl Capstone Project JHsl Capstone Project J
Hsl Capstone Project Jjlevy
 
Capstone Presentation
Capstone PresentationCapstone Presentation
Capstone Presentationjlevy
 
Cpj journalists safety guide 2012
Cpj journalists safety guide 2012 Cpj journalists safety guide 2012
Cpj journalists safety guide 2012 Tawanda Kanhema
 
Plug & Play News: Sourcing and Verifying News Online in 2022
Plug & Play News: Sourcing and Verifying News Online in 2022Plug & Play News: Sourcing and Verifying News Online in 2022
Plug & Play News: Sourcing and Verifying News Online in 2022Niki Radisic
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on futureRobert David Steele Vivas
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsPaul W. Taylor
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
 
murali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.docmurali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.docRadhika Murali
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomDoing What I Do
 

Mais procurados (20)

Misinformation management-tools
Misinformation management-toolsMisinformation management-tools
Misinformation management-tools
 
The first-ever-infodemilogical-study-1993
The first-ever-infodemilogical-study-1993The first-ever-infodemilogical-study-1993
The first-ever-infodemilogical-study-1993
 
‘Like a Virus’: Disinformation in the Age of COVID-19
‘Like a Virus’: Disinformation in the Age of COVID-19‘Like a Virus’: Disinformation in the Age of COVID-19
‘Like a Virus’: Disinformation in the Age of COVID-19
 
Cyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
 
Modernizing Dept of Homeland Security for CFAA investigations
Modernizing Dept of Homeland Security for CFAA investigationsModernizing Dept of Homeland Security for CFAA investigations
Modernizing Dept of Homeland Security for CFAA investigations
 
Journal of Physical Security 7(1)
Journal of Physical Security 7(1)Journal of Physical Security 7(1)
Journal of Physical Security 7(1)
 
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
GLOBALIZING TORTURE: CIA SECRET DETENTION AND EXTRAORDINARY RENDITION
 
Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future Directions
 
Chapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplinesChapter 5 collection and the collection disciplines
Chapter 5 collection and the collection disciplines
 
Hsl Capstone Project J
Hsl Capstone Project JHsl Capstone Project J
Hsl Capstone Project J
 
Capstone Presentation
Capstone PresentationCapstone Presentation
Capstone Presentation
 
Cpj journalists safety guide 2012
Cpj journalists safety guide 2012 Cpj journalists safety guide 2012
Cpj journalists safety guide 2012
 
Plug & Play News: Sourcing and Verifying News Online in 2022
Plug & Play News: Sourcing and Verifying News Online in 2022Plug & Play News: Sourcing and Verifying News Online in 2022
Plug & Play News: Sourcing and Verifying News Online in 2022
 
2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future2.7 workshop-on-intelligence-Steele on future
2.7 workshop-on-intelligence-Steele on future
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good Governments
 
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...
 
murali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.docmurali_radhika_assignment#6_CS684.doc
murali_radhika_assignment#6_CS684.doc
 
Securing Liberty Introduction
Securing Liberty IntroductionSecuring Liberty Introduction
Securing Liberty Introduction
 
Chapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whomChapter 4 the intelligence process a macro look who does what for whom
Chapter 4 the intelligence process a macro look who does what for whom
 

Destaque

บรรยาย Enemy as a system
บรรยาย Enemy as a systemบรรยาย Enemy as a system
บรรยาย Enemy as a systemWashirasak Poosit
 
บรรยายทฤษฎีการใช้กำลังทางอากาศ
บรรยายทฤษฎีการใช้กำลังทางอากาศบรรยายทฤษฎีการใช้กำลังทางอากาศ
บรรยายทฤษฎีการใช้กำลังทางอากาศWashirasak Poosit
 
Prometheus And Comm Strategy V12 Final Generic
Prometheus And Comm Strategy V12 Final GenericPrometheus And Comm Strategy V12 Final Generic
Prometheus And Comm Strategy V12 Final Genericlalowder
 
Pacific Tsunami Warning Center: Introduction to Enhanced Pacific Products and...
Pacific Tsunami Warning Center: Introduction to Enhanced Pacific Products and...Pacific Tsunami Warning Center: Introduction to Enhanced Pacific Products and...
Pacific Tsunami Warning Center: Introduction to Enhanced Pacific Products and...Brian Shiro
 
Education - Situational Awareness
Education - Situational AwarenessEducation - Situational Awareness
Education - Situational Awareness21Engineers
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Antonio Fontes
 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudProtectWise
 
Laser warning system
Laser warning systemLaser warning system
Laser warning systemdrdo012345
 
New technology - the threat to our information
New technology - the threat to our informationNew technology - the threat to our information
New technology - the threat to our informationnormanlamont
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat ModelingMarco Morana
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
SearchLove London | Will Critchlow, 'The Threat of Mobile'
SearchLove London | Will Critchlow, 'The Threat of Mobile' SearchLove London | Will Critchlow, 'The Threat of Mobile'
SearchLove London | Will Critchlow, 'The Threat of Mobile' Distilled
 
Just Enough Threat Modeling
Just Enough Threat ModelingJust Enough Threat Modeling
Just Enough Threat ModelingStephen de Vries
 
Pacific Tsunami Warning Center: Introduction to Tsunamis and PTWC Operations
Pacific Tsunami Warning Center: Introduction to Tsunamis and PTWC OperationsPacific Tsunami Warning Center: Introduction to Tsunamis and PTWC Operations
Pacific Tsunami Warning Center: Introduction to Tsunamis and PTWC OperationsBrian Shiro
 
Opportunity and Threat of External Environment
Opportunity and Threat of External EnvironmentOpportunity and Threat of External Environment
Opportunity and Threat of External EnvironmentNoonamsom
 
Russian assessment of missile threat
Russian assessment of missile threat Russian assessment of missile threat
Russian assessment of missile threat Russian Embassy
 
Ballistic Missile Defense Review February 2010
Ballistic Missile Defense Review February 2010Ballistic Missile Defense Review February 2010
Ballistic Missile Defense Review February 2010Department of Defense
 

Destaque (20)

บรรยาย Enemy as a system
บรรยาย Enemy as a systemบรรยาย Enemy as a system
บรรยาย Enemy as a system
 
บรรยายทฤษฎีการใช้กำลังทางอากาศ
บรรยายทฤษฎีการใช้กำลังทางอากาศบรรยายทฤษฎีการใช้กำลังทางอากาศ
บรรยายทฤษฎีการใช้กำลังทางอากาศ
 
Prometheus And Comm Strategy V12 Final Generic
Prometheus And Comm Strategy V12 Final GenericPrometheus And Comm Strategy V12 Final Generic
Prometheus And Comm Strategy V12 Final Generic
 
Essential components of a policy problem definition
Essential components of a policy problem definitionEssential components of a policy problem definition
Essential components of a policy problem definition
 
Pacific Tsunami Warning Center: Introduction to Enhanced Pacific Products and...
Pacific Tsunami Warning Center: Introduction to Enhanced Pacific Products and...Pacific Tsunami Warning Center: Introduction to Enhanced Pacific Products and...
Pacific Tsunami Warning Center: Introduction to Enhanced Pacific Products and...
 
Education - Situational Awareness
Education - Situational AwarenessEducation - Situational Awareness
Education - Situational Awareness
 
Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)Threat Modeling web applications (2012 update)
Threat Modeling web applications (2012 update)
 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the Cloud
 
Laser warning system
Laser warning systemLaser warning system
Laser warning system
 
Warning in Libya: The Rise of an Imminent Threat
Warning in Libya: The Rise of an Imminent ThreatWarning in Libya: The Rise of an Imminent Threat
Warning in Libya: The Rise of an Imminent Threat
 
New technology - the threat to our information
New technology - the threat to our informationNew technology - the threat to our information
New technology - the threat to our information
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
SearchLove London | Will Critchlow, 'The Threat of Mobile'
SearchLove London | Will Critchlow, 'The Threat of Mobile' SearchLove London | Will Critchlow, 'The Threat of Mobile'
SearchLove London | Will Critchlow, 'The Threat of Mobile'
 
Just Enough Threat Modeling
Just Enough Threat ModelingJust Enough Threat Modeling
Just Enough Threat Modeling
 
Pacific Tsunami Warning Center: Introduction to Tsunamis and PTWC Operations
Pacific Tsunami Warning Center: Introduction to Tsunamis and PTWC OperationsPacific Tsunami Warning Center: Introduction to Tsunamis and PTWC Operations
Pacific Tsunami Warning Center: Introduction to Tsunamis and PTWC Operations
 
Opportunity and Threat of External Environment
Opportunity and Threat of External EnvironmentOpportunity and Threat of External Environment
Opportunity and Threat of External Environment
 
Russian assessment of missile threat
Russian assessment of missile threat Russian assessment of missile threat
Russian assessment of missile threat
 
Part 3 Early Warning: The Five Pillars Of Disaster Resilience
Part 3 Early Warning: The Five Pillars Of  Disaster ResiliencePart 3 Early Warning: The Five Pillars Of  Disaster Resilience
Part 3 Early Warning: The Five Pillars Of Disaster Resilience
 
Ballistic Missile Defense Review February 2010
Ballistic Missile Defense Review February 2010Ballistic Missile Defense Review February 2010
Ballistic Missile Defense Review February 2010
 

Semelhante a Toward a Strategic Framework of Public Warning for Terrorism

Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...GiulianoBo45
 
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxWELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxalanfhall8953
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxrosemaryralphs52525
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGSJun Hao Lim
 
17 471 07_interest_groups_media_public
17 471 07_interest_groups_media_public17 471 07_interest_groups_media_public
17 471 07_interest_groups_media_publicAndrei Bujaki
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxchris293
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilRussell Publishing
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxwlynn1
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceAmber Wheeler
 
Bin Laden, Intelligence, And National Security
Bin Laden, Intelligence, And National SecurityBin Laden, Intelligence, And National Security
Bin Laden, Intelligence, And National Securityzmiers
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxbagotjesusa
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Felicia Barker
 
Snowden-final-report-for-publication
Snowden-final-report-for-publicationSnowden-final-report-for-publication
Snowden-final-report-for-publicationZarte Siempre
 
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxRESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxwilfredoa1
 

Semelhante a Toward a Strategic Framework of Public Warning for Terrorism (18)

Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
 
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docxWELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
WELCOME To Introduction to Homeland SecurityCJUS254-1504A-02.docx
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Article CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docxArticle CritiqueThis assignment provides you with an opportunity t.docx
Article CritiqueThis assignment provides you with an opportunity t.docx
 
(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS(Lim Jun Hao) G8 Individual Essay for BGS
(Lim Jun Hao) G8 Individual Essay for BGS
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
17 471 07_interest_groups_media_public
17 471 07_interest_groups_media_public17 471 07_interest_groups_media_public
17 471 07_interest_groups_media_public
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
 
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business CouncilMarc Pearl, President & CEO, Homeland Security & Defense Business Council
Marc Pearl, President & CEO, Homeland Security & Defense Business Council
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docx
 
Defense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military IntelligenceDefense Intelligence Agency And Military Intelligence
Defense Intelligence Agency And Military Intelligence
 
Bin Laden, Intelligence, And National Security
Bin Laden, Intelligence, And National SecurityBin Laden, Intelligence, And National Security
Bin Laden, Intelligence, And National Security
 
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docxSecuring our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
Securing our libertyCommonweal. 140.12 (July 12, 2013) p5.Cop.docx
 
Homeland Security
Homeland SecurityHomeland Security
Homeland Security
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...
 
Snowden-final-report-for-publication
Snowden-final-report-for-publicationSnowden-final-report-for-publication
Snowden-final-report-for-publication
 
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docxRESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
RESPONE TO EACH POST 100 WORDS MIN EACH1. The Nuclear .docx
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Toward a Strategic Framework of Public Warning for Terrorism

  • 1. One if by Land, Two if by Sea: Toward a Strategy of Public Warning for Terrorism May 31, 2007 John Fenzel, COL, USA
  • 2.
  • 3.
  • 6.  
  • 7.
  • 8.
  • 9.
  • 10.  
  • 11.  
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Toward a Strategic Framework of Public Warning Time Domestic Public (General) Alert International Targeted (Confidential) Alert Preemption Prevention Mitigation Point of Attack Recognition of Incomplete Information Notification of Threat
  • 17. Strategic Decision-Making in Warning for Terrorist Threats Risk Time Preemption Prevention Mitigation Point of Attack Recognition of Incomplete Information Notification of Threat Infiltration within U.S. Borders Targeted Warnings Expanded Warnings General Warnings
  • 18. John Boyd’s OODA Loop Model
  • 19.  
  • 20. Fielded Forces Population Infrastructure System Essentials Leadership John Warden’s “Five Rings” System Model
  • 21. Adapting Warden’s Five Rings Layers of Public Warning U.S. Populace First Responders National Infrastructure National Processes National Leadership
  • 22. Creating a Strategy of Public Warning for Terrorism Intelligence and Surveillance Public Warning Vulnerability Analysis Prevention Mitigation Preemption Predictive Analysis
  • 24.
  • 25. Orient Act Observe Decide Launch Targeted Warning LOW GUARDED ELEVATED Predictive Analysis: -Intelligence -Surveillance Yes (Attack) Preemption Destroy Warden’s Five Rings Detection/Notification of Threat International or Domestic Early to Mid Planning Stages Sufficient Information? Sufficient Capability? No (Move to Prevention)
  • 26. Orient Act Observe Decide HIGH Functional Warning Sector-Specific Warning Delay - Disrupt Predictive Analysis: -Incomplete Information -Inadequate Capability Vulnerability Analysis Prevention Notification/Detection of Threat Domestic Infiltration of Terror Cells Advanced Planning Stages Prioritize Objectives Using Warden’s Five Rings Model Protect Sources and Methods Public Safety Expanded Warning Observe Orient Act Decide
  • 27. SEVERE HSAS EAS NOAA Media COOP/COG Domestic Incident Management Mitigation Attack Imminent or in Progress Prioritize the Effort: Warden’s Five Rings Coordinate with Federal, State, Local Authorities and Private Entities General Warning Act Decide Orient Observe
  • 28.
  • 29.

Notas do Editor

  1. Public warning empowers people at risk to reduce losses from natural hazards, accidents, and acts of terrorism. Public warning saves lives, reduces fear, and speeds recovery. Its success is measured by the actions people take. Warning is an important element of providing for public safety. Public safety is a fundamental duty of municipal, county, and tribal government and, for larger hazards, of state and Federal government. Public safety is also the responsibility of citizens to take action