Information Sharing is a Linchpin for Securing Special Events

Information Sharing is a Linchpin for Securing Special Events

Information Sharing is a Linchpin for Securing Special Events

 
After the tragic events of 9/11, there was overwhelming consensus that a coordinated effort against terrorism and other public safety threats was required between the nation’s entire law enforcement, emergency management, and intelligence apparatus. This includes the identified requirement to secure large-scale public events. These events present a potential target for terrorism and other crimes based on size, scope, and especially notoriety.

As a result, National Special Security Event (NSSE) procedures were established in a portion of Presidential Decision Directive 62 in May 1998, which set out the security roles for federal agencies at major events. This was codified by law in the Presidential Threat Protection Act of 2000. The Department of Homeland Security (DHS) designates NSSEs based on the Special Event Assessment Rating (SEAR) to bring together the proper resources, expertise, and information sharing capabilities.  Very few of the events evaluated garner the NSSE designation; most fall under SEAR event status with levels 1-5. These levels determine the amount of resources that the Department of Homeland Security (DHS) and other federal agencies will provide.

Regardless of designation, information sharing has rightly become an attribute of the highest priority in both the planning and response to events.  How that information is shared, acted upon, and stored is a process that has made tremendous strides, but still continues to mature in scope and complexity.  

This need led to Multi-Agency Command Centers or MACCs at NSSEs and SEAR events. MACCs require representation from every jurisdiction and public safety domain involved with an event at the Federal, State, and Local level.  That agency representative has the ability to share information instantly with the entire population of the MACC. They also bring the ability to reach back within their own agency for response, investigation, and follow-up.  MACCs have become common place practice even in steady state communication centers and the role and scope of MACCs continues to evolve.

Bringing agencies together that share a common goal, but have different responsibilities and jurisdictions is challenging.  The need to share information, task resources, and exploit expertise outweighs these challenges.   Tragic criminal acts show that it is imperative for public safety officials to proactively share information which could endanger citizens.

Technology has also advanced the use of MACC principals in event security.  Computer platforms help share information securely. Participants can now share information remotely from fixed locations or even at event sites via mobile devices with ease.

Sharing law enforcement and public safety information with those who have jurisdictional public safety missions is essential. Information sharing is a force multiplier that saves time, resources, and potentially even lives.

Learn more about how Arc Aspicio supports:
The Law enforcement Mission
The Emergency Management Mission
The Intelligence Mission

Contributors

Jim Mackin | Jim joins Arc Aspicio with a wealth of experience in law enforcement, Intelligence, and public affairs. For more than 27 years, Jim served as a Special Agent with the United States Secret Service, retiring as a Deputy Assistant Director (DAD) in the agency’s Office of Protective Operations. Jim had previously served as the DAD in the Office of Government and Public Affairs, where he was the primary spokesperson for the agency, responsible for all internal and external communications and inter-agency liaison activities. Jim has a proven track record for developing resolutions to problems and crises that agencies sometimes face through proactive mitigation strategies and effective communication. Jim’s work within the Intelligence community provides him great insight and first hand experience in information collection, reporting, and dissemination. His background within the Department of Homeland Security makes him well suited to provide clients with both tried and innovative options for change and resolution strategies

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Cybersecurity, managing and protecting computer systems from attacks, is evolving just as quickly as the techniques hackers use to cause damage. Historically, the public and private sectors believed that stronger technology and more advanced computer systems alone were enough to prevent attacks. As new trends emerge and the technologies used to both conduct and prevent hackings improve, cybersecurity strategies must remain agile, trying new tactics to counter changing threats.

Hacking Back – Do the Benefits Outweigh the Risks?

Hacking Back – Do the Benefits Outweigh the Risks?

With the increased frequency and sophistication of cyber-attacks worldwide, companies and executives are becoming frustrated with a traditional focus on defensive tactics. As a result, some private sector actors are taking a more active role in cybersecurity by “hacking back” – hacking against the very groups that are attacking their systems in retaliation or to retrieve stolen data. As hacking back rises in popularity, it is important to consider a number of political and legal issues and the risks to counter-terrorism efforts.

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

Washington, DC, October 19, 2018 — LeadersNest named Arc Aspicio CEO Lynn Ann Casey a FedFem Award Honoree. The FedFem awards salute high-impact women executives and leaders of the government contracting community. FedFem Award Honorees blend their entrepreneurial courage and Federal government support that effectively impacts the industry, national economy, and the local marketplace. 

Boosting the Mission: Developing Acquisition Requirements Guidance

Boosting the Mission: Developing Acquisition Requirements Guidance

To keep up with the fast pace of change in the field of Government acquisitions, Department of Homeland Security (DHS) components are developing their own acquisition requirements (AR) policies. However, without specific timeframes to finalize these policies, DHS agencies often lack guidance on how to develop ARs. Among DHS agencies, the U.S. Coast Guard is leading the way with their own formal policy to describe this process. To compliment the U.S. Coast Guard’s policy, DHS created the Joint Requirements Integration and Management System (JRIMS) to offer direction for agencies—to review, validate, and suggest solutions for capability gaps and requirements.

Top Qualities of Design Thinking Leaders

Top Qualities of Design Thinking Leaders

Design Thinking is on the rise in the business world. Design Thinking leaders focus on creating the best product for their clients and working with the experiences and insight of fellow coworkers. Some of the key characteristics of Design Thinking leaders present themselves in individuals who are open and subject themselves to vulnerability with clients and coworkers. These qualities help leaders to connect and build relationships with others. They also create an open flow of communication that allows for others to better share their knowledge to align with and understand the company's mission.

Think, Key, Speak: Purposeful Communications

Think, Key, Speak: Purposeful Communications

I spent the early years of my career in the United States Navy as a Naval Flight Officer on the E-2C Hawkeye, the Navy’s aircraft carrier-based Airborne Early Warning and Command and Control platform. The various missions of the aircraft demand that aircrew monitor up to ten radio frequencies, and actively speak on three or four of those, at any given moment in flight.