1 / 25

The City and Security

Explore the evolution of city security from the walled cities of the past to the challenges of securing unwalled cities in the modern era. Discover the role of the nation state, trade routes, and systematic infrastructure protection in securing our cities.

lcarrington
Download Presentation

The City and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The City and Security Era 1--The Walled City: 500 AD to 1700 Era 2--The Unwalled City: 1700 to 9/11/2001 Era 3--Securing the Unwalled City: April 8, 2003 to Implosion of the Unwalled City Era 4--Return to the Walled City: Beginning with Implosion of the Unwalled City

  2. Louis XIV: The Sun King (1643-1715) L’Etat, C’est Moi (The State, That’s Me)

  3. Walled Paris:17th Century 17th Century Paris: Population 100,000 17th Century London: Population 40,000

  4. Unwalled ParisApril 3, 2005

  5. From Walled to Unwalled City: The Crucial Role of the Nation State Trade Routes City # 1 City # 2 Land Routes: State Controlled Army Sea Routes: State Controlled Navy

  6. Era 3: Securing the Unwalled City Phase I: Urban Area Security Initiative (April 8, 2003) (Pork Barrel Urban Security) Phase II: Re-Engineering the City: Systematic Infrastructure Protection • December 17, 2003—HSPD # 7

  7. Urban Area Security Initiative (UASI)

  8. Ohio—(UASI) Ohio 2005 UASI Allocation: $26 million $26 million divided by 4 Ohio Cities: Cleveland Toledo Columbus Cincinnati

  9. Phase II:Systematic Infrastructure Protection HSPD-7 (issued December 17, 2003) directed the development of a National Infrastructure Protection Plan (NIPP). HSPD-7 specifies the following key content elements: • A strategy to identify, prioritize, and coordinate CI/KR protection; • Descriptions of activities which support each element of the strategy; • A summary of initiatives for sharing CI/KR information and for providing CI/KR threat warning data; and • Coordination and integration with other Federal emergency management and preparedness activities.

  10. The Not so Hidden Message inHSPD # 7 A Federal Top Down Hierarchical Strategy

  11. The Initial Problems of Federal Strategy Problem I Distinguishing Between Critical and Non Critical Infrastructure

  12. Critical Infrastructure/Key Resources (CI/KR) Critical Infrastructure/Key Resources (CI/KR) include the assets, systems, networks and functions that provide vital services to the nation. (NIPP, June 2006, Page 7)

  13. Critical Infrastructure: Definitions • “Key Resources” are the publicly or privately controlled resources essential to the minimal operations of the economy and government • “Key Assets” are the individual targets whose destruction could cause large-scale injury, death, or destruction of property, and/or profoundly damage our national prestige and confidence

  14. Problem II: Categorizing Critical Infrastructure

  15. Problem III: Horizontal Coordination The NIPP was officially released on June 30, 2006.

  16. Problem IV: Vertical Coordination Coordination With States Coordination with the Private Sector

  17. Sector-Specific Plans Sector-Specific Plans Sector-Specific Plans Sector-Specific Plans Sector-Specific Plans Sector-Specific Plans Sector-Specific Plans Sector-Specific Plans Sector-Specific Plans (17) Solving Vertical Coordination: Sector-Specific Plan • Are tailored to address the unique characteristics and risk landscapes of each sector • Sector-Specific Agencies partner with SCCs and GCCs to develop the SSPs • Detail the application of the NIPP risk management framework across each sector • SSPs are to be submitted to DHS within 180 days after the NIPP is issued (December 31, 2006)

  18. Sector Partnership Model

  19. Information Sharing and Protection

  20. The Technological Challenge • Engineering New Efficient & Effective Technology • Sensor Technology • Integration of Multiple Sensor Data • Making Sensor Data Intelligible

  21. Engineering Technology and Infrastructure Security

  22. Integration of Sensor Data Government Fusion Center

  23. UCII: Core Team • Arthur Helmicki • Sensor Experience: Structural Monitoring • Data Processing, Visualization • Victor Hunt • Sensor Experience: Structural Monitoring • Condition Assessment • James Stever • Sensor Experience: Military Interdiction • Policy Analysis • Intergovernmental Management More than 5 decades total experience, liaisons to the wider base of expertise at UC and elsewhere

  24. The UC Critical Infrastructure Security Project • Extension of SETCP to Ohio • Extension of Dual Uses: • radiology, transportation infrastructure, traffic flow/emergency response • Multimodal: • Land/Inland Waterways, Layered to Increase Security • Interstates + Southern Border Initiative + Northern Border Initiative

  25. References National Strategy for Protection of Critical Infrastructure and Key Assets, 2003 http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf National Infrastructure Protection Plan, 2006 http://www.dhs.gov/xprevprot/programs/editorial_0827.shtm#0 Lewis Mumford. The Culture of Cities. New York: Harcourt Brace, 1970. Niall Ferguson. Collossus: The Price of America’s Empire. New York: Penquin Press, 2004 Stephen Flynn. The Edge of Disaster. New York, Random House, 2007 America the Resilient: http://www.foreignaffairs.org/20080301faessay87201/stephen-e-flynn/america-the-resilient.html

More Related