SlideShare a Scribd company logo
1 of 12
03067-1
QTR REV 25 Jun 02
National Defense Industrial
Association Conference
19 June 2003
LTC Eugene Stockel
Product Manager,
Physical Security Equipment
DSN: 654-2416 / COMM: (703) 704-2416
E-mail: eugene.stockel@pm-pse.army.mil
03067-2
Provide Cost-Effective, State-of-the-Art, and Logistically Supportable
Physical Security and Force Protection Capability to Installations and
Tactical Forces Deployed Worldwide
Mission
03067-3
Responsibilities
DoDD 3224.3
Physical Security Equipment (PSE) Program
and
Action Group (PSEAG)
ARMY
• INTERIOR PSE
• C2 SYSTEMS
• SECURITY LIGHTING
• TACTICAL FORCES
SECURITY SYSTEMS
• BARRIER SYSTEMS
• MASS NOTIFICATION
PERSONNEL ALERTING
• INTERIOR ROBOTICS
• EXTERIOR ROBOTICS
NAVY
• ANTI-COMPROMISE
EMERGENCY
DESTRUCTION
• SHIPBOARD AND
WATERSIDE SYSTEMS
• LOCKS
• UNDERWATER ROBOTICS
• EXPLOSIVES DETECTION
SYSTEMS
AIR FORCE
• EXTERIOR PSE
• ENTRY CONTROL
SYSTEMS
• DISPERSED SENSOR
SYSTEMS
DEFENSE THREAT
REDUCTION AGENCY
• APPLIED RESEARCH
• Access Control
Army Focus Areas
• Contingency Operations
• Intrusion Detection
03067-4
Force Protection Requirement
“A Comprehensive Approach to Force Protection is Required …However, the Task Force
strongly believes that to assure an acceptable level of security for U.S. forces worldwide,
commanders must aggressively pursue an integrated systems approach to force protection
that combines awareness and training, physical security measures, advanced technology
systems, and specific protection measures tailored to each location.”
AN ASSESSMENT OF THE KHOBAR TOWERS BOMBING. MAJOR FINDINGS, AND
RECOMMENDATIONS OF THE DOWNING ASSESSMENT TASK FORCE.
03067-5
Force Protection Pillars
Physical
Security
FORCE
PROTECTION
Foreign Intelligence, Counterintelligence,
and Other Security Programs
Information
Operations
Law
Enforcement
Combating
Terrorism
High
Risk
Personnel
Security
03067-6
a. The Army lacks an effective doctrinal
definition and collective understanding of the
term “Force Protection.”
c. Until the Army clearly defines the term
“Force Protection” and the relationship to AT,
confusion throughout the force will persist and
unit AT programs will continue to be
ineffective.
The Force Protection Challenge
03067-7
Development Responsibilities
Combat Developer
• Formulate Concepts, Doctrine,
Organizational Structure, Materiel
Objectives, and Requirements
• Comply With AR 71-9 by Ensuring
Materiel, Training, Personnel,
Logistics, and Doctrine Tactics
Are Identified, Integrated, Tested,
and Refined Throughout the
Materiel Acquisition Process
Materiel Developer
• Plan and Manage Acquisition
Programs Consistent With the
Policies and Procedures Issued
by the Army Acquisition Executive
and Appropriate Regulations,
Policies, Procedures, and
Standards
• Provide the Planning Guidance,
Direction, Control, Oversight, and
Support Necessary to Ensure
Systems Are Developed in
Accordance With Army Enterprise
Architecture, to Include
Certification of Compliance With
the MDA Prior to Formal Release
of the Draft and Final
Solicitations; Minimize Life-cycle
Cost; And Are Fielded Within
Cost, Schedule, and Performance
Baselines
Physical
Security
FORCE
PROTECTION
Foreign Intelligence, Counterintelligence,
and other Security Programs
Information
Operations
Law
Enforcement
Combating
Terrorism
High
Risk
Personnel
Security
03067-8
Force Protection Requirements
Definition and Assessment Process
Combat
Developer
Materiel Developer
Force Protection Requires Combat Developer and Materiel Developer
Synchronization
PEO Combat Support/Combat
Service Support
PEO Ground Combat Systems
PEO Soldier
PEO Ammunition
PEO Smart Munitions
PEO Enterprise Information
Systems
PEO Chemical and Biological
Defense
PEO Intelligence Electronic
Warfare and Sensors
PEO Air and Missile Defense
PEO Aviation
PEO Command, Control, and
Communications (Tactical)
IN
AR
AD
CE
MP
SG
MI
CM
EG
FA
AV
OD
PEO Simulation Training and
Instrumentation
03067-9
“What Are We Doing?”
Tactical Garrison
PEWD-II
PM-PSE is Exploring Opportunities to Enhance Physical Security Across the
Operational Spectrum: Installations, Contingency Operations, and Transformation
ICIDS
ACP
MDARS-E
ETF
03067-10
Tactical Physical Security/Force
Protection Focus
MI
FSB
X
II
I
•••
Capability Shortfall
Focus on Low Density, High Demand, Critical Assets, and Functions Crucial
to Force Projection Operations and Stability and Support Operations
F172
F172
03067-11
Technology Integration is Key
Ground
Surveillance
Radar
Vehicle Mast Mounted
Surveillance System and
TPSE C2
Remote/Unmanned Weapon
Networked Unattended
Ground Sensor
UGS/GSR Cues
Imager
Organic S-UAV and UGV
Response to BLOS Alarms
QRF
TPSE Cdr
Deploys Response
to ID Threat
Sensor/SA Data Provided to Site CP
Threat/IPD Data Pushed to TPSE
Predator
National/Strategy
Assets Provide IPB
Terrain Analysis
Identifies Gaps in
Unit’s SA; Defines
TPSE Deployment
ASREQ Call For
Fire from UAE
Net Fire
Connectivity to
the TACNET
Core Objective Force –
TPSE must
Interface/Interoperate with
this Architecture
Multiple Technologies – Need to be Synthesized
03067-12
Summary
• Focus Efforts Within Combat Developer and Materiel Developer
Communities
• Army Requires a Force Protection Program
– Analysis of Alternatives
– Integration
– Capability Development
– Fielding
• Synchronize Development and Funding
– Science Technology
– Acquisition Programs
– Procurement

More Related Content

Similar to stock.ppt

Usdod road map_2007-2032
Usdod road map_2007-2032Usdod road map_2007-2032
Usdod road map_2007-2032Agie Abdissalam
 
Dod Unmanned Systems Roadmap 2007-2032
Dod Unmanned Systems Roadmap 2007-2032Dod Unmanned Systems Roadmap 2007-2032
Dod Unmanned Systems Roadmap 2007-2032528Hz TRUTH
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceDale Butler
 
ICAS COURSE - Guard Tier Rating Standards
ICAS COURSE - Guard Tier Rating StandardsICAS COURSE - Guard Tier Rating Standards
ICAS COURSE - Guard Tier Rating StandardsKevin D. James
 
Unmanned Aircraft System Fundamentals
 Unmanned Aircraft System Fundamentals Unmanned Aircraft System Fundamentals
Unmanned Aircraft System FundamentalsJim Jenkins
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Heather-Fiona Egan
 
Pham, Tri VMET_Document
Pham, Tri VMET_DocumentPham, Tri VMET_Document
Pham, Tri VMET_DocumentTri Pham
 
Career Snapshot - Jay King, PMP, CPP, PSP
Career Snapshot - Jay King, PMP, CPP, PSPCareer Snapshot - Jay King, PMP, CPP, PSP
Career Snapshot - Jay King, PMP, CPP, PSPJay King
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...Power System Operation
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxjaggernaoma
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationInfosec
 
IEC62443.pptx
IEC62443.pptxIEC62443.pptx
IEC62443.pptx233076
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxJohn96107
 
RESUME_Aylmer John 2016-12-09
RESUME_Aylmer John  2016-12-09RESUME_Aylmer John  2016-12-09
RESUME_Aylmer John 2016-12-09John Aylmer
 

Similar to stock.ppt (20)

Usdod road map_2007-2032
Usdod road map_2007-2032Usdod road map_2007-2032
Usdod road map_2007-2032
 
Dod Unmanned Systems Roadmap 2007-2032
Dod Unmanned Systems Roadmap 2007-2032Dod Unmanned Systems Roadmap 2007-2032
Dod Unmanned Systems Roadmap 2007-2032
 
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conferenceSMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
SMi Group's Future Armoured Vehicles Protection Systems USA 2020 conference
 
ICAS COURSE - Guard Tier Rating Standards
ICAS COURSE - Guard Tier Rating StandardsICAS COURSE - Guard Tier Rating Standards
ICAS COURSE - Guard Tier Rating Standards
 
Unmanned Aircraft System Fundamentals
 Unmanned Aircraft System Fundamentals Unmanned Aircraft System Fundamentals
Unmanned Aircraft System Fundamentals
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
Holtzlander Resume1-23-16
Holtzlander Resume1-23-16Holtzlander Resume1-23-16
Holtzlander Resume1-23-16
 
Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1Innovation fund themed competition webinar - session 1
Innovation fund themed competition webinar - session 1
 
Pham, Tri VMET_Document
Pham, Tri VMET_DocumentPham, Tri VMET_Document
Pham, Tri VMET_Document
 
USN IT Transcript
USN IT TranscriptUSN IT Transcript
USN IT Transcript
 
Career Snapshot - Jay King, PMP, CPP, PSP
Career Snapshot - Jay King, PMP, CPP, PSPCareer Snapshot - Jay King, PMP, CPP, PSP
Career Snapshot - Jay King, PMP, CPP, PSP
 
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
FRAMEWORK FOR EPU OPERATORS TO MANAGE THE RESPONSE TO A CYBER-INITIATED THREA...
 
5757912.ppt
5757912.ppt5757912.ppt
5757912.ppt
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313Resume - Timothy Lewis 20160313
Resume - Timothy Lewis 20160313
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
 
IEC62443.pptx
IEC62443.pptxIEC62443.pptx
IEC62443.pptx
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
CMMC DFARS/NIST SP 800-171
CMMC DFARS/NIST SP 800-171 CMMC DFARS/NIST SP 800-171
CMMC DFARS/NIST SP 800-171
 
RESUME_Aylmer John 2016-12-09
RESUME_Aylmer John  2016-12-09RESUME_Aylmer John  2016-12-09
RESUME_Aylmer John 2016-12-09
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

stock.ppt

  • 1. 03067-1 QTR REV 25 Jun 02 National Defense Industrial Association Conference 19 June 2003 LTC Eugene Stockel Product Manager, Physical Security Equipment DSN: 654-2416 / COMM: (703) 704-2416 E-mail: eugene.stockel@pm-pse.army.mil
  • 2. 03067-2 Provide Cost-Effective, State-of-the-Art, and Logistically Supportable Physical Security and Force Protection Capability to Installations and Tactical Forces Deployed Worldwide Mission
  • 3. 03067-3 Responsibilities DoDD 3224.3 Physical Security Equipment (PSE) Program and Action Group (PSEAG) ARMY • INTERIOR PSE • C2 SYSTEMS • SECURITY LIGHTING • TACTICAL FORCES SECURITY SYSTEMS • BARRIER SYSTEMS • MASS NOTIFICATION PERSONNEL ALERTING • INTERIOR ROBOTICS • EXTERIOR ROBOTICS NAVY • ANTI-COMPROMISE EMERGENCY DESTRUCTION • SHIPBOARD AND WATERSIDE SYSTEMS • LOCKS • UNDERWATER ROBOTICS • EXPLOSIVES DETECTION SYSTEMS AIR FORCE • EXTERIOR PSE • ENTRY CONTROL SYSTEMS • DISPERSED SENSOR SYSTEMS DEFENSE THREAT REDUCTION AGENCY • APPLIED RESEARCH • Access Control Army Focus Areas • Contingency Operations • Intrusion Detection
  • 4. 03067-4 Force Protection Requirement “A Comprehensive Approach to Force Protection is Required …However, the Task Force strongly believes that to assure an acceptable level of security for U.S. forces worldwide, commanders must aggressively pursue an integrated systems approach to force protection that combines awareness and training, physical security measures, advanced technology systems, and specific protection measures tailored to each location.” AN ASSESSMENT OF THE KHOBAR TOWERS BOMBING. MAJOR FINDINGS, AND RECOMMENDATIONS OF THE DOWNING ASSESSMENT TASK FORCE.
  • 5. 03067-5 Force Protection Pillars Physical Security FORCE PROTECTION Foreign Intelligence, Counterintelligence, and Other Security Programs Information Operations Law Enforcement Combating Terrorism High Risk Personnel Security
  • 6. 03067-6 a. The Army lacks an effective doctrinal definition and collective understanding of the term “Force Protection.” c. Until the Army clearly defines the term “Force Protection” and the relationship to AT, confusion throughout the force will persist and unit AT programs will continue to be ineffective. The Force Protection Challenge
  • 7. 03067-7 Development Responsibilities Combat Developer • Formulate Concepts, Doctrine, Organizational Structure, Materiel Objectives, and Requirements • Comply With AR 71-9 by Ensuring Materiel, Training, Personnel, Logistics, and Doctrine Tactics Are Identified, Integrated, Tested, and Refined Throughout the Materiel Acquisition Process Materiel Developer • Plan and Manage Acquisition Programs Consistent With the Policies and Procedures Issued by the Army Acquisition Executive and Appropriate Regulations, Policies, Procedures, and Standards • Provide the Planning Guidance, Direction, Control, Oversight, and Support Necessary to Ensure Systems Are Developed in Accordance With Army Enterprise Architecture, to Include Certification of Compliance With the MDA Prior to Formal Release of the Draft and Final Solicitations; Minimize Life-cycle Cost; And Are Fielded Within Cost, Schedule, and Performance Baselines Physical Security FORCE PROTECTION Foreign Intelligence, Counterintelligence, and other Security Programs Information Operations Law Enforcement Combating Terrorism High Risk Personnel Security
  • 8. 03067-8 Force Protection Requirements Definition and Assessment Process Combat Developer Materiel Developer Force Protection Requires Combat Developer and Materiel Developer Synchronization PEO Combat Support/Combat Service Support PEO Ground Combat Systems PEO Soldier PEO Ammunition PEO Smart Munitions PEO Enterprise Information Systems PEO Chemical and Biological Defense PEO Intelligence Electronic Warfare and Sensors PEO Air and Missile Defense PEO Aviation PEO Command, Control, and Communications (Tactical) IN AR AD CE MP SG MI CM EG FA AV OD PEO Simulation Training and Instrumentation
  • 9. 03067-9 “What Are We Doing?” Tactical Garrison PEWD-II PM-PSE is Exploring Opportunities to Enhance Physical Security Across the Operational Spectrum: Installations, Contingency Operations, and Transformation ICIDS ACP MDARS-E ETF
  • 10. 03067-10 Tactical Physical Security/Force Protection Focus MI FSB X II I ••• Capability Shortfall Focus on Low Density, High Demand, Critical Assets, and Functions Crucial to Force Projection Operations and Stability and Support Operations F172 F172
  • 11. 03067-11 Technology Integration is Key Ground Surveillance Radar Vehicle Mast Mounted Surveillance System and TPSE C2 Remote/Unmanned Weapon Networked Unattended Ground Sensor UGS/GSR Cues Imager Organic S-UAV and UGV Response to BLOS Alarms QRF TPSE Cdr Deploys Response to ID Threat Sensor/SA Data Provided to Site CP Threat/IPD Data Pushed to TPSE Predator National/Strategy Assets Provide IPB Terrain Analysis Identifies Gaps in Unit’s SA; Defines TPSE Deployment ASREQ Call For Fire from UAE Net Fire Connectivity to the TACNET Core Objective Force – TPSE must Interface/Interoperate with this Architecture Multiple Technologies – Need to be Synthesized
  • 12. 03067-12 Summary • Focus Efforts Within Combat Developer and Materiel Developer Communities • Army Requires a Force Protection Program – Analysis of Alternatives – Integration – Capability Development – Fielding • Synchronize Development and Funding – Science Technology – Acquisition Programs – Procurement