Megatrends Global Safety and Security overview

tochetan 9 views 12 slides Aug 06, 2024
Slide 1
Slide 1 of 12
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12

About This Presentation

Mega trends and how they aged


Slide Content

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
Global Safety & Security Global Safety & Security
Solutions (GS3)Solutions (GS3)
03/21/02
MegatrendMegatrend
OverviewOverview

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 2
What’s A Megatrend?What’s A Megatrend?
•A direction or sequence of events with momentum and
durability that is slow to establish but, when adopted by the
Market, stay with us for a longtime (7 or more years)
•It requires multiple key drivers (demographics, natural
resources and environment, science and technology,
national and international governance, future conflict,
global economy and globalization).
•It requires at least one sustainable source of financing
(budget surplus, grant, general appropriation)
•It must support many Users who are moving in the same
direction; the more repeatable, the more attractive.

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 3
Sociological DriversSociological Drivers
•Expectation of traveling anywhere, at anytime safely.
•Expectation that the ‘Government’ will protect the Public and
their property wherever they go.
•Increasing dependence on electronic communications,
information services and e-commerce.
•Belief that local Police and Fire protection is equipped for
any and all emergencies
•Global spread of terrorist violence directed at the Civilians
not the Military.
•Growing Public concern about theft of identity and finances
through use of electronic communications, information
services and e-commerce.
•Growing Public concern about the loss of privacy and
convenience vs. personal safety.

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 4
Political/Legislative DriversPolitical/Legislative Drivers
•Federal declares War on Terrorism and deploys troops
•Federal & State Offices of Homeland Security put in place
•Federal begins to provide access control and security patrols
at Hi-Vi Public venues and airports
•Federal acknowledges fragility of U.S. borders to passage by
International terrorists, drug dealers and illegal immigration.
•Federal acknowledges terrorist attacks forced 1st Responders
into the role of ‘Front-line Homeland Military’ without adequate
support.
•Federal acknowledges need for improved Info-sharing and
communications interoperability between agencies
•Federal acknowledges national dependence on electronic
communications and Information networks and the lack of
adequate security and disaster recovery plans for them.

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 5
Technology DriversTechnology Drivers
•Explosive Global growth of:
–Wireless Voice/Messaging as a replacement for Wireline
phone and Wireless paging services
–Access to the Internet for information dissemination, e-mail,
e-commerce, entertainment, ID theft and espionage
–‘Always On, Always Connected’, Internet Protocol (IP) based
wired/wireless data networks
–The number of destructive computer hackers and IP-network
attack and disable technologies
•Increasing emphasis on solutions using ‘Open’, Globally
accepted, ‘Standards-based’ technologies
•Introduction of Countrywide/Statewide, 1
st
Responder,
shared, wireless voice/data systems with an IP-network
infrastructure

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 6
Economic DriversEconomic Drivers
•Proposed 2003 Federal budget for Homeland Security
–$48B more to Pentagon to fight War on Terrorism
–$5.9B to combat Bioterrorism
–$52B for Information Technology including:
•$26B DOD Information Technology
•$4.2B Cyber Security
–$722M Interagency Information sharing and protection including:
»$380M INS Entry-Exit System
»$125M FBI Infrastructure Protection Center
»$80M 1
st
Responder Priority Cellular Coverage
»$30M Cyber Warning Intelligence Network
»$5M GovNet Protected Federal Intranet
•$23M State Dept. modernization of Passport System
•$31M DOJ Integrated Fingerprint ID System
Source: Washington Post, 02/05/02

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 7
MegatrendsMegatrends
•Continuing worldwide growth of the Internet
•Demand for a safe and secure Homeland
•Exponential increase in use of electronic communications
•Growth of electronic government and e-commerce
•Growing need to identify one’s self to obtain services
•Growing concern for loss of personal privacy and
identification theft
•Increasing emphasis on Standards, licensing and
harmonization

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 8
Potential Matching TechnologiesPotential Matching Technologies
•Shared 1
st
Responder wireless communications systems
–Integrated voice and data
–Inherent inter-agency interoperability and info-sharing
–Encryption services
–Built-in Infrastructure Security
•Biometric ID, Authentication and Access Control:
–Physiological: Eye, Iris and Retinal, Facial, Hand, Fingerprint
–Behavioral: Voice, Signature, Keystroke dynamics
•Intelligent Physical and Biological Sensors/MEMS
–Threat detection
–Threat assessment
•Wireless Tracking and Locating
–Where are you? Family Members, Tourists, Public Safety Units or even
Potential Terrorists?

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 9
Potential Matching Technologies 2Potential Matching Technologies 2
•‘Always connected, Always on’ wired/wireless data
technologies:
–Instant Messaging
–GPRS and High Speed Data (HSD)
–Imaging and Streaming Video
–Wireless LAN and HSD ’Hot spots’
–Secure, electronic commerce
•Information Technology Infrastructure Security
–Network Management
–Data encryption
–Attack Prevention: anti-virus, firewalls, etc.
–Detection: DDOS, intrusion, etc.
–Recovery: disaster recovery, data storage and backup

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 10
Potential Matching Technologies 3Potential Matching Technologies 3
•IT Network Managed Security Services
•Managed Industrial/Home Security Services

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 11
GS3 Prioritized Solution SpacesGS3 Prioritized Solution Spaces
•Fingerprint ID (part of biometric security)
•Command & Control
•Wireless Communications
•Accountability Systems
•Biometric Security
•Decision Support Systems
•Information Security Services (accel. oppor. in Core)
•Location Tracking
•Monitoring and Sensing
•Systems Integration (accel. oppor. Managed Security Sys.)
•WLAN
New Identified Oppor. Accelerated Oppor. In Core

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 12
Review GS3 Next StepsReview GS3 Next Steps
•GS3 Compass Business Intelligence repository matching
Solution Spaces at: www.compass.mot.com/go/98911552
–Each Solution Space technology contains folders to hold
background, key competitor and market research information
–I have place around 90 NEW background and market research
documents in Biometrics, Info Security and General Security
•Develop an overview of target Solution Spaces?
–Biometrics overview example follows, do you want more?
•Develop target segment overviews within a Space?
–Need GS3 team member to identify appropriate target(s)
•Develop a profile of key vendors within an identified target
segment?
–How many vendors?
–How deep?