Integrated Air Surveillance Concept of Operations - Joint Planning ...
Integrated Air Surveillance Concept of Operations - Joint Planning ...
Integrated Air Surveillance Concept of Operations - Joint Planning ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Integrated</strong> <strong>Air</strong> <strong>Surveillance</strong> <strong>Concept</strong> <strong>of</strong> <strong>Operations</strong><br />
Risk: A measure <strong>of</strong> potential harm that encompasses threat, vulnerability and consequence. (2)<br />
(8)<br />
Risk Level: A metric used to describe briefly the potential severity <strong>of</strong> the subject risk posed to<br />
the United States and its interests. (2)<br />
Risk Pr<strong>of</strong>ile: A summary <strong>of</strong> threat, consequence and vulnerability characteristics dynamically<br />
associated with a flight object. This information is compiled with the aid <strong>of</strong> automation and<br />
analyzed by DHS, ATO and other security partners. (2)<br />
Security Volumetric Expression: The volume <strong>of</strong> protected area around an asset or an event in<br />
response to a security risk pr<strong>of</strong>ile. (2)<br />
Separation: A minimum distance to keep an aircraft safe from other aircraft, terrain, obstacle,<br />
the ground, or specified airspace. (2)<br />
Service (Net-Centric Information Management): A computational mechanism that: (a)<br />
enables access to one or more capabilities using a prescribed interface; (b) is composed <strong>of</strong><br />
operations (e.g., create, read, update, delete) usually having a common, functional goal; (c) is<br />
<strong>of</strong>fered by one system/s<strong>of</strong>tware application to another system/s<strong>of</strong>tware application; (d) is carried<br />
out via the electronic exchange <strong>of</strong> data and information over an enterprise network; and<br />
(e) follows a precise set <strong>of</strong> rules and protocols according to a service definition (a machine and<br />
human-readable, technical description <strong>of</strong> the service). (6)<br />
Situational Awareness: The shared cognizance and understanding <strong>of</strong> the present events—as<br />
well as an evaluation <strong>of</strong> the risks, threats, vulnerabilities and potential consequences—which<br />
transpire in some domain. This status is accomplished through an interconnected network <strong>of</strong><br />
machines and personnel communicating data and information about the event in real time. (2) (8)<br />
Stakeholder: A person or organization that has a legitimate interest, or vested interest in a<br />
project or entity; anyone with an interest (or stake) in what the entity does. The security and<br />
aviation organizations involved in or affected by security activities. (2) (4) (8)<br />
<strong>Surveillance</strong>: The process for gathering information about a nature, position, or movement <strong>of</strong> a<br />
target (e.g., tracking the position and vector <strong>of</strong> an aircraft or a vessel). (1) (2)<br />
<strong>Surveillance</strong> Community: The surveillance mission partners, industry and academia. (1) (2)<br />
Suspicious Activity Report: A report generated by a person or machine that results from<br />
suspicious behavior and includes key information about the flight, the aircraft operator, the air<br />
traffic management position detecting the suspicious activity, and the aircraft’s location. (2)<br />
Suspicious Behavior: Behavior where (a) the intention is unclear (intentionally or<br />
inadvertently), or (b) there is reason to doubt the intention or execution <strong>of</strong> some behavior,<br />
indicating that a person, object, or other entity should be put under surveillance. (1) (2) (6) (8)<br />
November 2011 58