• Like
PPT
Upcoming SlideShare
Loading in...5
×
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
458
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
1
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Read first bullet to the audience. This is a program a supporting IT system developed for first responders for pre-incident prevention and protection to identify their critical infrastructures. A methodology developed by first responders for first responders At the same time it satisfies DHS’s strategic requirements to identify and collect CI/KR (critical infrastructure/key resources) This methodology assists the first responder with building a relationship with the asset manager. The more effort put into this relationship the more information that will come out which will result in a more thorough assessment. LA PD has played a fundamental role in DHS’s ability to satisfy the first responder requirements at the same time satisfy their strategic requirements
  • The PCII Program is a tool necessary to achieve the level of trust between the asset manager and the first responders. PCII is only one piece of the program; it’s only one tool on a tool belt and this tool belt also includes the relationship with the site owner and first responder. The bottom line is, the moment a piece of information is entered into ACAMS it is PCII protected!
  • We leverage the close relationship between CI/KR and the first responders that protect, defend, and respond to them on a daily basis This approach is more bottom up by leveraging that need for communication and coordination among first responders. Trust relationships are easier to form between the asset manager and the first responders. The goal is to use that relationship to gather accurate information that is ultimately going to be delivered to the first responders so that they can provide the best protection possible to the asset.. The focus of the program today is the collection and delivery of information useful for the deterrence, protection, and defense.
  • This slide goes over ACAMS tools and capabilities.

Transcript

  • 1. Constellation/Automated Critical Asset Management System (C/ACAMS) Infrastructure Information Collection Division Office of Infrastructure Protection National Protection and Programs Directorate U.S. Department of Homeland Security
  • 2. Agenda / Discussion Points
    • C/ACAMS Overview
    • Stakeholders
    • Concept of Operations
    • Tools and Resources
    • Technical Assistance / “Training”
    • Near Term Objectives
    • Long Term Objectives
  • 3. Constellation / Automated Critical Asset Management System (C/ACAMS)
    • C/ACAMS is a secure, Web-based information services portal used to support infrastructure protection efforts at the state and local level
      • Provides access to a comprehensive set of tools and resources to develop and implement comprehensive critical infrastructure programs
      • Allows users to manage the collection and effective use of asset data
      • Focuses on pre-incident prevention and protection but also assists in post-incident response
      • Designed principally as a vulnerability assessment tool
    • DHS derives programmatic authority to build and manage C/ACAMS from:
      • Homeland Security Act of 2002
      • Homeland Security Presidential Direction (HSPD) – 7: Critical Infrastructure Identification, Prioritization and Protection
      • HSPD – 8: National Preparedness
      • National Infrastructure Protection Plan (NIPP)
    • C/ACAMS incorporates national-level guidance to ensure consistency among state and local partners
  • 4.
    • State and Local First Responders, Emergency Managers, and Homeland Security Officials
    • DHS Office on Infrastructure Protection, Infrastructure Information Collection Division (IICD)
    • Los Angeles Police Department (LAPD) Operation Archangel
    • DHS Protected Critical Infrastructure Protection (PCII) Program Office
    • DHS Federal Emergency Management Agency National Preparedness Directorate (FEMA/NPD)
    C/ACAMS Principal Stakeholders
  • 5. DHS Office of Infrastructure Protection SSA EMO Protective Security Coordination Division (PSCD) Resource Management and Planning Contingency Planning & Incident Management Division (CPIMD) Partnership & Outreach Division (POD) HITRAC Chemical Security Compliance Division (CSCD) Infrastructure Information Collection Division (IICD) Infrastructure Analysis & Strategy Divison (IASD) Contingency Planning & Incident Management Division (CPIMD) Administration Chief of Staff ------------------- Dep. Chief of Staff External and International Affairs Assistant Secretary for Infrastructure Protection ---------------------------------------------------------------- Dep. Assistant Secretary for Infrastructure Protection
  • 6. DHS PCII Program Office
    • The Protected Critical Infrastructure Information (PCII) Program, managed by the DHS PCII Program Office, is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government
    • Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under:
      • Freedom of Information Act (FOIA) requests
      • State and local sunshine laws
      • Civil litigation proceedings
    • C/ACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received, validated, and disseminated in accordance with the CII Act
  • 7. C/ACAMS Concept of Operations
    • Use of C/ACAMS ensures that state, local and regional CIP programs are consistent with the NIPP and other federal-level plans, programs, and policies
      • Built around the NIPP, DHS Risk Management Framework
      • Incorporates existing Infrastructure taxonomy
    • C/ACAMS integrates existing, emerging DHS methodologies and reporting requirements
      • Build DHS-level data models to ensure consistency across IT systems
      • Push to build, implement national vulnerability and risk assessment methodologies
      • Allow federal, state, local, private sector to speak the same CI/KR “language”
      • Will work with states and commercial vendors to ensure data consistency across tools, enable integration of existing infrastructure data management tools
  • 8. C/ACAMS Concept of Operations
    • C/ACAMS leverages the close relationship between local law enforcement, first responders and the asset owner/operators
      • CI/KR owners/operators are a key partner in planning and use of C/ACAMS
      • C/ACAMS success depends on Public/Private Partnerships (P 3 )
    • Focuses on gathering detailed, accurate asset information pre- and post-incident vulnerability and protection planning
      • Supports both the “Cop on the Beat” and an Incident Commander during a major response effort
      • Incorporates private sector equities through close, regular coordination and cooperation
    • Allows DHS to augment its collection of CI/KR data through the activities of tens of thousands of local law enforcement and emergency management personnel across the nation
      • C/ACAMS CONOPS assumes that processes to identify CI/KR assets are continuous and could involve hundreds of people within a large urban area
      • C/ACAMS enables the effective inventory and management of thousands of assets within these areas
  • 9. C/ACAMS Tools and Resources
  • 10. C/ACAMS Tools and Resources
    • A CI/KR asset management system that focuses on the unique requirements and information needs of first responders
    • Vulnerability and consequence scoring tools that aid the user’s subjective analysis of criticality
    • An integrated open source information portal, Constellation, tying together critical asset data and reporting about the current threat environment
    • A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
    • Generate Buffer Zone Protection Plans (BZPPs)
    • Generate pre-incident operational plans for local police and first responders
    • Electronically available resources for first responders, such as the DHS Daily Report, training materials, on-line manuals, and ACAMS FAQs
    • Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
  • 11. C/ACAMS Training
    • All C/ACAMS training is provided via the CI/KR Asset Protection Technical Assistance Program (CAPTAP)
      • CAPTAP is an approved technical assistance program certified and financially supported by FEMA/NPD
      • CAPTAP sessions are requested through a request-driven process initiated by States and Urban Areas
    • CAPTAP assists state, local officials develop and implement comprehensive asset protection programs using C/ACAMS as a “force multiplier”
      • CAPTAP service includes a five-day, on-site session with follow-up consultation, as needed
      • Provides attendees with an on-site assessment walk-through at a CI/KR site
    • To date, 1106 have attended the CAPTAP and approved for access to use C/ACAMS, with another 1000 projected during FY08
  • 12. C/ACAMS Current User Base By State 63 558 3 5 5 32 22 6 9 36 36 24 20 15 5 25 33 35 States (plus DC) Approved for PCII Access 15 States Not Approved for PCII Access 13 States with data loaded on ACAMS Local Entities Approved for ACAMS Access Indianapolis Police Department Seattle Police Department 1 1 1 4 7 MA (53) CT (3) DE MD (12) DC (45) 1 1 3 2 1 38 10 11 1 3 2 2 3 1106 C/ACAMS Users as of Nov 01 ~24000 Assets Entered as of Nov 01
  • 13. Near-term Objectives
    • Strategic Marketing and Outreach
      • Deliver a clear, consistent message on what C/ACAMS is and isn’t
    • Expand interaction with other DHS, federal partners to ensure coordination and consistency
      • Working internally with Vulnerability Assessments Branch (VAB) on common assessment methodologies for DHS
      • Expand and enhance existing relationship with the PCII Program Office
    • Leverage the State, Local, Tribal, Territorial Government Coordination Council (SLTTGCC)
      • Coordinate customer input on C/ACAMS processes, procedures, systems, and CI/KR Protection Planning issues
    • Formal policies and operating procedures for:
      • C/ACAMS Use and Governance
      • Constellation
      • State-level C/ACAMS implementation, SOPs
    • Train, train, train!
  • 14. Long-term Objectives
    • C/ACAMS Information Technology (IT) System Development, Operations & Maintenance
      • Establish production, redundant continuity of operations (COOP) IT infrastructures
      • Establish a robust national roll out technical support plan
      • Continue to coordinate within DHS to build, implement national vulnerability and risk assessment methodologies
    • Operational and Strategic Requirements
      • Continue to align and integrate C/ACAMS with other DHS infrastructure information collection programs
      • Continue to refine C/ACAMS to meet users needs and requirements
  • 15. Questions?
    • Mr. Michael Clements
    • C/ACAMS Senior Project Officer
    • [email_address]
    • Tel: 703-235-3911
    • [email_address]