1 / 17

Homeland Security S&T Summit (SE Region)

Homeland Security S&T Summit (SE Region). Topic: Information Sharing in the Homeland Security Environment Speaker: Trent DePersia Deputy Director DHS S&T Command, Control and Interoperability Division Norven Goddard Assistant Director for Science and Technology

nigel
Download Presentation

Homeland Security S&T Summit (SE Region)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Homeland Security S&T Summit (SE Region) Topic: Information Sharing in the Homeland Security Environment Speaker: Trent DePersia Deputy Director DHS S&T Command, Control and Interoperability Division Norven Goddard Assistant Director for Science and Technology Alabama Department of Homeland Security John Hoyt Branch Chief, Knowledge Management Tools DHS S&T Command, Control and Interoperability Division Date: April 7, 2009

  2. Homeland Security S&T Summit (SE Region) • Topic: • Tools, technologies, and methodologies that support information sharing among and between local, state, and Federal homeland security practitioners • Application to First Responders and Preparedness: • Improved capabilities for sharing information between first responders, emergency managers, and other relevant individuals. • Application to the Southeast: • The ability to scale local solutions to regional and national levels

  3. CCI’s Information Sharing Philosophy In Action • The Command, Control and Interoperability Division at DHS S&T provides what it calls a toolkit - the tools, technologies, governance models, and resources to enable Homeland Security Practitioners to gather, analyze, manage, share, and secure information. • Using a practitioner-driven approach, CCI enables the creation and deployment of information resources that ensure seamless and secure interactions among homeland security stakeholders.

  4. The Information Sharing Problem • The need for relevant, real-time, and actionable information is critical, however existing information is often siloed and inaccessible when it is needed the most. • A plethora of information sharing options exist – what is necessary and sufficient? What is too much?

  5. Broad Information Sharing Capability Gaps • Data and Sensor Fusion – The information sharing infrastructure and threat identification and decision analysis tools for local, state and Federal practitioners • Threat-Specific Information Sharing – Real-time identification, correlation, assessment and dissemination of threat information • Cross-Entity Sharing – Distribution of intelligence products to state, local, tribal, and industrial homeland security mission partners • Data Management – On-demand management, analysis, and visualization of information in multiple forms and from diverse, distributed structured and unstructured sources • Identity, Classification and Privacy Management – Scalable technologies, standards and policies to manage identities, rights, and authorities in networks

  6. Open Discussion For the next 20 minutes, we would like to discuss your information sharing… • Problems? • Issues? • Limiting constraints?

  7. NORVEN GODDARD ASSISTANT DIRECTOR SCIENCE AND TECHNOLOGY NORVEN.GODDARD@SMDC.ARMY.MIL (256) 684-5078 ALABAMA DEPARTMENT OF HOMELAND SECURITY 07Apr2009

  8. Alabama Homeland Security Vision Civil Air Patrol Strategic Assets Imagery Sensors Networks Databases Automatic Decision Aids Advanced Communications Situational Awareness/Understanding Leveraging Existing Technologies to Enhance Homeland Security Capabilities

  9. Virtual Alabama Alabama’s Common Operational Picture A geo-spatial visualization program that leverages existing state asset imagery and infrastructure data to create an information tool for federal, state and local agencies. • Employs the power of existing & evolving internet based applications. • Integrates & distributes proprietary data • Affordable, scalable, maintainable Winner of Multiple National Awards Real-time Applications • Common operational picture • Emergency evacuation routing • Situational awareness/understanding • Vehicle and asset tracking • Critical infrastructure mapping • Student density • Identification of assets and vulnerabilities • Visualization of risks • Plume modeling and real time sensors feeds • Implementation of protective measures during events • Damage assessment The State’s Information in Context

  10. Information Sharing Activities of Interest Identity Management Testbed The project will develop technologies for managing identities, rights, and authorities used within and external to an organization’s networks. The testbed will help establish how interoperability can be achieved between multiple external identity adjudication support systems; thus, allowing those system to be configured to enable timely and complete evaluation of an individual’s status and eligibility for access. CUI Framework Implementation Test and EvaluationThe project will evaluate the Controlled Unclassified Information (CUI) framework and specified dissemination instructions for applicability and clarity across multiple types of CUI information, communication channels, and end-user communities. It will enable secure, accurate, timely, and thorough distribution of DHS information to external homeland security partners to improve coordinated threat assessment and mitigation activities Critical Infrastructure Inspection Management System (CIIMS) CIIMS is an information sharing technology/tool that enables personnel to efficiently manage and prioritize inspections of critical structures such as dams, bridges, and large industrial complexes. It was first demonstrated with the Maryland State Police aerial units and it is readily transferable to assist other entities in their efforts to secure critical infrastructures and resources nationwide.

  11. Information Sharing Activities of Interest Data Fusion Technologies These efforts will develop a sensor integration technology to fuse massive volumes of potentially hostile surveillance activity information from government and private sector sensor systems. It will also rapidly analyze the nature, composition, and pattern of the threat to support a common operating/ intelligence picture. Integrated Data Processing and Analysis These projects will develop scalable technologies for the integrated analysis of free text, database records, audio, video, imagery, transactional data, geographical data, and sensor information. Ultimately, the effort will establish and validate reliable performance metrics for integrated data processing and analysis. Real-Time Data Processing and Visualization These projects will develop technologies for dynamic, real-time processing and visualization of information in multiple forms and from diverse, distributed sources. The ability to automate the selection, ranking, and correlation of relevant information will support purpose-driven decision making.

  12. Information Sharing Activities of Interest Regional Information Sharing and Collaboration (RISC) RISC addresses the need to share information regionally within the domain of law enforcement. One current RISC pilot is the electronic sharing of driver’s license photos across state boundaries. Additional RISC pilots are exploring the use of wireless smart-phones, including iPhones, to allow law enforcement officers in the field to retrieve information from their existing systems and perform simple analysis on the data. Data Privacy Enabling Technology These efforts will work to develop technology that can be inserted into existing systems to help automate the ability to identify, validate, and prioritize according to the privacy rule sets.

  13. Open Discussion • What haven’t we discussed? • Southern Shield? • Activities at the Tennessee State Fusion Center? • All-hazards information sharing issues? – tornados to terrorists

  14. Additional References • S&T Directorate • http://www.dhs.gov/xabout/structure/editorial_0531.shtm • Command, Control, and Interoperability Division • http://www.dhs.gov/xabout/structure/gc_1224532340996.shtm • Cyber Security • http://www.cyber.st.dhs.gov • National Visualization and Analytics Center • http://nvac.pnl.gov/ • Virtual Alabama • http://www.dhs.alabama.gov/virtual_alabama/home.aspx

  15. How to Get Involved • Trent DePersia – Trent.DePersia@DHS.gov • Norven Goddard – Norven.Goddard@dhs.alabama.gov • Norven.Goddard@us.army.mil • John Hoyt – John.Hoyt@DHS.gov

  16. Homeland Security S&T Summit (SE Region) • Topic:Information Sharing in the Homeland Security Environment • Take-Aways: • S&T is here to understand your concerns in the field • Information sharing is not dependent on one solution, but the interoperability of several solutions • Information sharing is a two-way street • Information sharing strategies need to leverage a bottom-up approach where capabilities are developed at the state and local levels and integrated into Federal systems

More Related