170 likes | 384 Views
ATC Maastricht Conference 2005. Requirements and Tradeoffs “Securing and Growing Aviation”. Amr ElSawy Tom Berry Greg Nelson Center for Advanced Aviation System Development The MITRE Corporation. The Events of 9/11 Changed the Aviation World.
E N D
ATC Maastricht Conference 2005 Requirements and Tradeoffs“Securing and Growing Aviation” Amr ElSawy Tom Berry Greg Nelson Center for Advanced Aviation System Development The MITRE Corporation
The Events of 9/11 Changed the Aviation World “What is new is the range, scale, and intensity of the threat” – Kofi Anon, 2 Dec 2004, The Economist
Working to Make Air Transportation More Secure Prevent Protect React
But Where Has That Left the Passenger? Source: http://www.reviewjournal.com/lvrj_home/2004/Jan-13-Tue-2004/photos/airport.jpg
Airlines Pilots Passengers Aircraft Imbedding Security in Every Element of The System – Use Time and Space Flight Data, Instructions ATM Schedules, Delays, cancellations ETMS, ATC Software status OAG/CRS, marketing info Status, Conditions, Fuel, etc. Schedules, Delays, fares, market offers Itineraries Type, status Services Provided Schedule, status Travel Services Hotels, Ground Transport
Aviation Security Must Serve the Traveling Public • Complement, not dominate the experience • Avoid Stove Pipes • Manage Flows • Use Space and Time • Continuous Sensing Photo credits: UL. http://www.the-human-race.com/images/environment/smokestacks.jpg, UR. ,LL. http://www.anvil-media.com/archives/070102/gallery.html, LR. www.crispata.com/sample/pages/smokestack_color_submit.html
DoT An increase in airport specific terrorist chatter in the last 3 weeks Active, Alert, Aware, Fast, Resilient, Responsive, Comprehensive ? Baggage the tests positive for biological agents Government DoD/Northcom NASA DOS Public/Industry CDC The 3rd stolen rental car in 3 weeks found near an airport Freight Forwarders Manufacturers & Shippers Intelligence Community Travel agents & GDSs Travelers Technology DOJ Data Airlines Risk Assessment Providers FAA NTSB Processes People General & Biz Aviation DHS IA&IP Local Law Enforcement Aircraft Manufacturers Aviation Training Orgs Airports Profitable, manageable travel Suspicious activity at the checkpoint DHS CBP DHS EPR DHS S&T TSA Protect transportation systems, ensure freedom of movement for people and commerce
Limited Choice is Accompanied by Information Asymmetries ? Hmm?
Government NASA DoD/Northcom DoT DOS Public/Industry CDC Manufacturers & Shippers Intelligence Community Freight Forwarders Travel agents & GDSs Travelers Technology DOJ Data Airlines Risk Assessment Providers FAA NTSB Processes People General & Biz Aviation DHS IA&IP Local Law Enforcement Aircraft Manufacturers Aviation Training Orgs Airports DHS EPR DHS CBP DHS S&T TSA Traditional Systems and Organizations Limit Information Choice If we knew all of the connections, we could build a roadmap to a more secure transportation environment
Alert Level Yellow Richness vs. Reach Traditional systems and structures require a tradeoff between… VS. A very rich exchange of detailed information but limited to a very few A very broad exchange of information but with little detail or context
Right Information It’s a Matter of Putting the … Right Place Right Time
Swift Travel .Com Imagine A World… Video File
Swift Travel .Com Behind the Scenes, the Security System Makes Flights More Secure VideoFile
Architecture Principles for the “New System” • Efficient Flow in all segments of system • Multi-layered security enclaves using space and time • Early detection and correlation of events • Increase automation decision aids • Avoid/protect single points of failure • Provide common inter-organization situational awareness • Construct self-healing information/decision networks • Distributed/mobile command and control • Manage the “soft inside”
Important Challenges • Aligning policies, regulations and institutional relationships • Distributed Training and Scenario Execution • Privacy v. Anonymity • Investment choices and timing to implement capabilities • Asymmetric and Distributed Threats
“Move Anyone or Anything, Anywhere, Anytime, On TimeANDKnow Almost Anything about Almost Everything in Almost Real Time”