1 / 9

Homeland Security Institute

Homeland Security Institute. Overview and Issues for DIMACS Workshop Gary G. Nelson gary.nelson@hsi.dhs.gov Senior Researcher September 29, 2004. Background on HSI. Homeland Security Act of 2002 Sec. 312. Duties: Systems/risk analysis, modeling… Economic and policy analysis…

Download Presentation

Homeland Security Institute

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Homeland Security Institute Overview and Issues for DIMACS Workshop Gary G. Nelson gary.nelson@hsi.dhs.gov Senior Researcher September 29, 2004

  2. Background on HSI Homeland Security Act of 2002 Sec. 312 • Duties: • Systems/risk analysis, modeling… • Economic and policy analysis… • Evaluation of effectiveness… • Identification of common standards… • Assistance in establishing testbeds • Metrics of effectiveness • Design/support exercises & simulations • Strategic technology development plans Competitively Awarded to ANSER HSI Federally Funded Research and Development Center (FFRDC) Arlington, VA FY05 Research Plan FY04 Research Plan

  3. Domain Integration Engage Stakeholders . . . . . . Challenge Assumptions

  4. Integrated/Systems Approach SPONSOR GOALS Improve the homeland security value of existing systems—focus on Critical Infrastructures and Key Resources. Stimulate development and acquisition of new systems with homeland security value. Effective Resource Allocation End-to-End Analyses Operations Deployment Acquisition Life-Cycle Analyses System Development Technology Development Research Portfolio Trades

  5. Multi-Dimensional Outreach Strategy Stakeholders “Force Multipliers”

  6. Connecting to Workshop Issues Networks: Objects+LinksEmergence Their Attack Damage Our Vulnerable Assets Prevent Physical Networks Our Security Protect Information on physical state (limits) Actions (physical state change) Decision Networks (logical) Their Risk Decisions Information (limits) Our Risk Decisions

  7. Disrupt their physical attack pathway Identify our physical vulnerabilities Make our security (prevent, protect) pathways robust Make effective security decisions Many scales (programming to incident response) Collaboratively (resource contention) Robustly (with risk) Adaptively (evo-devo) What are we Trying to Do? Logical Physical Communication of relevant physical state physical networks Communication of critical physical activations

  8. You: resource--Problem: utilization • Systems approach: organize resources into capabilities! • Apply the theory, but how? • A decision network problem • Collaboration of program planners, operators and researchers…all of whom suffer significant and mutual information limits • Risk: establish robust programs given significant external information limits • A bias • Great focus on information-communications • Not enough on decision support applications and techniques

  9. Outlook • HSI will be one of the foci of collaborations • FY05 consultancies and subcontracts • Tasks focused on network/decision approaches • We can make leaps with “dual benefit” • Exploit the modeling and sensing of the physical network • Exploit modeling of the logical network • Exploit the great leap in open-systems communications (while protecting that physical asset) www.homelandsecurity.org gary.nelson@hsi.dhs.gov

More Related