McLean, Virginia, United States
3K followers 500+ connections

Join to view profile

About

David supports national security clients to include those in the Intelligence Community,…

Articles by David

Activity

3K followers

See all activities

Experience & Education

  • Deloitte

View David’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

Publications

  • Harnessing Data For National Security

    Johns Hopkins School of Advanced International Study Journal

    Since 9/11, the U.S. government has initiated efforts to enhance its information-sharing capabilities and doubled its investment in counterterrorism, spending nearly $80 billion. Sharing data and conducting analyses across the government’s legacy stovepipes of information is challenging but mandatory to reduce redundancy, increase cost efficiency, and improve national security mission performance. The challenges involved in harnessing big data analytics for a more enlightened approach to…

    Since 9/11, the U.S. government has initiated efforts to enhance its information-sharing capabilities and doubled its investment in counterterrorism, spending nearly $80 billion. Sharing data and conducting analyses across the government’s legacy stovepipes of information is challenging but mandatory to reduce redundancy, increase cost efficiency, and improve national security mission performance. The challenges involved in harnessing big data analytics for a more enlightened approach to national security center on striking the optimal balance between complex opposing forces—opportunity versus risk, collective security versus individual privacy, and innovation versus protection. While the government has made progress in identifying existing data sources and sharing high-level metadata, it is still in the early phases of the maturity curve in terms of enabling access across the federal ecosystem to leverage the valuable analytics that inform evidence-driven decision-making. This paper explores the strategies and frameworks to expedite effectively analyzing and using data to drive national security activities.

    Other authors
    See publication
  • Reimagining Homeland Security

    Booz Allen Hamilton

    The nation’s continued safety and security is dependent upon the continued maturation and institutionalization of a homeland security enterprise comprised of partners at all levels of government and the private sector. It is by strengthening this homeland security enterprise and adopting a whole community approach that we can, as a nation, prevent, prepare, respond to and recover more quickly from large-scale disasters.
    THE CHALLENGE
    As the nation reflects on the 10th anniversary of the…

    The nation’s continued safety and security is dependent upon the continued maturation and institutionalization of a homeland security enterprise comprised of partners at all levels of government and the private sector. It is by strengthening this homeland security enterprise and adopting a whole community approach that we can, as a nation, prevent, prepare, respond to and recover more quickly from large-scale disasters.
    THE CHALLENGE
    As the nation reflects on the 10th anniversary of the September 11th terrorist attacks, we face a continued challenge in keeping the homeland safe, secure, and resilient against terrorism and other hazards. The Department of Homeland Security (DHS) along with law enforcement agencies across the Federal Government struggle to clearly link the mission needs with capabilities, demonstrate measurable outcomes, maximize resources, and eliminate redundancies. The mission of protecting the homeland only increases in scale and intensity as the threat to the homeland continues to evolve, trade flowing across our borders continues to increase, cybersecurity threats continue to grow, and natural disasters continue to impact us.
    The papers Include:

    --Comprehensive Immigration Reform

    --Re-imagining the Border: Functional Border Management

    --Marshaling Data for Enterprise Insights

    --The Path Toward Resiliency

    --Enabling Agility in Law Enforcement

    Other authors
    See publication
  • Transforming Intelligence Using Industry Best Practices – The Terrorism Value Chain

    MITRE International Conference on Intelligence Analysis

    As a result of the September 11 terrorist attacks over three years ago, the Intelligence Community (IC) has undergone intense scrutiny in the way it collects, analyzes and shares information. The dilemma now facing the IC is how to alter existing strategies and adapt to the new threat environment while successfully countering emerging threats to the nation’s security. This paper seeks to demonstrate how one such analytic method developed by Booz Allen Hamilton—terrorism value chain…

    As a result of the September 11 terrorist attacks over three years ago, the Intelligence Community (IC) has undergone intense scrutiny in the way it collects, analyzes and shares information. The dilemma now facing the IC is how to alter existing strategies and adapt to the new threat environment while successfully countering emerging threats to the nation’s security. This paper seeks to demonstrate how one such analytic method developed by Booz Allen Hamilton—terrorism value chain analysis—can aid Intelligence Analysts in identifying or inferring terrorist intentions. Developed from commercial industry best practices, value chain analysis applied to counterterrorism helps analysts break down and make transparent the steps or activities needed to complete terrorist activity from start to finish. Case studies have determined what is essentially the "terrorist value chain": that series of necessary events that add required characteristics—value—to the terrorists' "product"—the attack. Value chain analysis promotes the identification and analysis of each stage in the chain, ultimately providing insight into ways of disrupting or even preventing the attack. Finally, this methodology allows for the integration of different forms of intelligence data, even when the data comes from disparate sources or even different intelligence disciplines.

    Other authors
    See publication

Languages

  • English

    -

View David’s full profile

  • See who you know in common
  • Get introduced
  • Contact David directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses