Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Talking Points HSPD-5 required the Department of Homeland Security (DHS) to coordinate with other Federal departments and agencies and State, local, and tribal governments to establish a National Response Plan (NRP) and National Incident Management System (NIMS). HSPD-8 complements and supports HSPD-5. The purpose of HSPD-8 is to "establish policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic all-hazards preparedness goal , establishing mechanisms for improved delivery of Federal preparedness assistance to State and local governments, and outlining actions to strengthen preparedness capabilities of Federal, State, and local entities." The NRP defines what needs to be done to manage a major incident, the NIMS defines how it needs to be done, and the Goal defines how well it needs to be done. The Goal provides for the development of a National Preparedness System to help the Nation develop and maintain the capabilities to prevent, protect against, respond to, and recover from major incidents as described in the NRP and NIMS. HSPD-9 establishes policies to protect the nation’s food and agriculture activities.
  • Current capabilities exist in multiple, independent programs to collect, maintain, and process separate components of information required for risk analysis IICP will integrate these programs thereby eliminating duplication, providing long-term cost savings, and reducing burden to owners/operators Systems integration planning underway in a parallel effort to continue support to customers To meet the needs and requirements of risk analysis and critical infrastructure protection, information collected must provide three primary outputs: Normalized, Quantifiable Risk Data Data Standards Metadata
  • This slide goes over ACAMS tools and capabilities.
  • If you remember nothing else about the CONOPS remember this assessment pyramid! First cast the wide net, to inventory what is critical, large number of sites, shallow amount of data but site visit is not required. The reason is that there is data is available through open source; you can go on the internet and pull the information needed. Based on your city or state’s priorities you may decide that an asset requires a deeper level assessment requiring the next stage of an AMQ or asset management questionnaire. AMQ represents more information about a site and requires some level of outreach from the first responder It also requires more buy in by the asset manager, this training program illustrates the value of the relationship between the first responder and the asset manager. This training specifically shows first responders how to approach their asset managers with their initial outreach. Again, based on your priorities you may decide a site requires the highest level of assessment of this model and require an initial assessment visit or an IAV An IAV is a two day, two person, boots on the ground detailed assessment of the facility.
  • PowerPoint

    1. 1. Infrastructure Information Collection Division Timothy Huddleston Deputy Director Infrastructure Information Collection Division Office of Infrastructure Protection
    2. 2. Agenda <ul><li>Office of Infrastructure Protection (OIP) </li></ul><ul><li>Infrastructure Information Collection Division (IICD) </li></ul><ul><li>Infrastructure Information Collection Program (IICP) </li></ul><ul><ul><li>Automated Critical Asset Management System (ACAMS) </li></ul></ul><ul><ul><li>Infrastructure Data Warehouse (IDW) </li></ul></ul><ul><ul><li>Integrated Common Analytical Viewer (iCAV) </li></ul></ul><ul><ul><li>Risk Analysis and Management for Critical Asset Protection (RAMCAP) </li></ul></ul><ul><ul><li>Vulnerability Identification Self-Assessment Tool (VISAT) </li></ul></ul><ul><ul><li>Current / End State </li></ul></ul><ul><ul><li>Next Steps </li></ul></ul><ul><li>Questions </li></ul>
    3. 3. Office of Infrastructure Protection (OIP) Strategic Drivers HSPD-5 HSPD-7 HSPD-8 The Homeland Security Act of 2002 established an Assistant Secretary for Infrastructure Protection, with responsibility for assessing vulnerabilities of key resources and critical infrastructures and developing a comprehensive national plan. In 2006, P.L. 109-295, Section 550 directed regulation of high risk chemical facilities. HSPD-9 National strategies for Homeland Security, Cyber Security, and Physical Protection of CI/KR provided high level goals and priorities for the Office of Infrastructure Protection HSPDs 5-9 & 19 provide inter-related and focused policy guidance in the areas of incident management, critical infrastructure protection, and national preparedness. HSPD-7 is a central policy driver of IP plans and programs Secretary’s 2 nd Stage Review “ 2SR” established the Preparedness Directorate, which aligns IP with other DHS preparedness partners The 2005 hurricanes affirmed the Preparedness Directorate’s important mission and IP’s central role in preparedness HSPD-19
    4. 4. OIP’s Vision, Mission, and Goals <ul><li>VISION: </li></ul><ul><li>A safe, secure, and resilient national infrastructure through public and private partnerships. </li></ul><ul><li>MISSION: </li></ul><ul><li>Lead the coordinated national effort to reduce the risk to our critical infrastructures and key resources posed by acts of terrorism, as well as enable national preparedness, timely response and rapid recovery in the event of an attack, natural disaster or other emergency . </li></ul><ul><li>GOALS: </li></ul><ul><li>Understand and share risk and other information about terrorist threats and other hazards to our national CI/KR. </li></ul><ul><li>Build and sustain effective CI/KR partnerships and coordination mechanisms. </li></ul><ul><li>Build and implement a sustainable, national CI/KR risk-management program. </li></ul><ul><li>Ensure efficient use of resources for KI/KR risk reduction. </li></ul><ul><li>Provide a foundation for continuously improving national CI/KR preparedness. </li></ul><ul><li>Promote an OIP culture of organizational excellence and a quality work environment that value and support our workforce. </li></ul>Mission Vision Goals
    5. 5. NIPP Operational Framework <ul><ul><li>As the operational framework for IP activities, the NIPP will: </li></ul></ul><ul><ul><ul><li>Detail the national architecture we will use to protect our CI/KR sectors (governance, information sharing, risk analysis, protective measures, and performance measurement) </li></ul></ul></ul><ul><ul><ul><li>Provide a clear division of labor between IP and our Federal State, local, tribal, and private sector partners </li></ul></ul></ul><ul><ul><ul><li>Form the basis for a risk-based CI/KR protection requirements determination and prioritization process </li></ul></ul></ul><ul><ul><ul><li>Inform the annual Federal budget process in the IP mission area </li></ul></ul></ul>Physical Physical Human Cyber Assess Risks (Consequences, Vulnerabilities & Threats) Implement Protective Programs Measure Effectiveness Prioritize Identify Assets, Systems, Networks, and Functions Set Security Goals The NIPP’s risk management framework establishes the process for combining consequence, vulnerability, and threat information to produce a comprehensive, systematic, and rational assessment of national or sector risk that drives CI/KR risk reduction activities. Continuous improvement to enhance protection of CI/KR
    6. 6. OIP Structure HITRAC <ul><li>Chemical Security Compliance Division </li></ul><ul><li>Implement chemical sector security legislation </li></ul><ul><li>Regulate security activities for chemical industry </li></ul><ul><li>Oversee inspector cadre </li></ul><ul><li>Review chemical site security plans, conduct inspections, and audit sites </li></ul><ul><li>Infrastructure Information Collection Division </li></ul><ul><li>Infrastructure information Collection Program </li></ul><ul><li>Infrastructure Critical Asset Viewer </li></ul><ul><li>Collection Management </li></ul><ul><li>Geospatial Support </li></ul><ul><li>National Infrastructure Inventory </li></ul><ul><li>Infrastructure Analysis & Strategies Division* </li></ul><ul><li>National Infrastructure Simulation & Analysis Center </li></ul><ul><li>Strategic Homeland Infrastructure Risk Assessment </li></ul><ul><li>Tier 1 & 2 Analysis </li></ul><ul><li>Sector Assmts </li></ul><ul><li>Committee on Foreign Investment in the US Support </li></ul><ul><li>Red Team </li></ul><ul><li>S&T Liaison </li></ul><ul><li>CI/KR Protective Security Coordination Division </li></ul><ul><li>Protective Measures </li></ul><ul><li>Protective Security Advisor </li></ul><ul><li>Buffer Zone Protection Program </li></ul><ul><li>Comprehensive Review </li></ul><ul><li>Office for Bombing Prevention </li></ul><ul><li>Site Assistance Visits </li></ul><ul><li>CI/KR Contingency Planning and Incident Management Division </li></ul><ul><li>National Infrastructure Coordinating Center </li></ul><ul><li>Plans </li></ul><ul><li>Training </li></ul><ul><li>Readiness/Continuity of Operations </li></ul><ul><li>Exercises </li></ul><ul><li>Incident Management Support </li></ul><ul><li>CI/KR Partnership and Outreach Division </li></ul><ul><li>National Infrastructure Protection Plan Program Management Office </li></ul><ul><li>NIPP Metrics </li></ul><ul><li>NIPP Education & Awareness </li></ul><ul><li>Protected Critical Infrastructure Information </li></ul><ul><li>National Infrastructure Advisory Council </li></ul><ul><li>Critical Infrastructure Warning Information Network </li></ul><ul><li>Homeland Security Information Network-Critical Sectors </li></ul><ul><li>Sector Coordination </li></ul><ul><li>- - - - - - - - - - - - </li></ul><ul><li>Sector Specific Agencies </li></ul><ul><ul><li>Dams </li></ul></ul><ul><ul><li>Chemical </li></ul></ul><ul><ul><li>Nuclear </li></ul></ul><ul><ul><li>Emergency Services </li></ul></ul><ul><ul><li>Commercial Facilities </li></ul></ul>Office of the Assistant Secretary for Infrastructure Protection *Note: The Infrastructure Analysis & Strategy Division represents a partnership between OIP and the Critical Infrastructure Threat Analysis Division within the Office of Intelligence and Analysis. This partnership, named HITRAC, is led by M.Smislova (I&A) and B.Wales (OIP) serves as D.Director.
    7. 7. IICD’s Vision, Mission, and Goals <ul><li>VISION: </li></ul><ul><li>Provide the DHS enterprise solution for the collection and sharing of infrastructure data </li></ul><ul><ul><li>Create more relevant infrastructure information </li></ul></ul><ul><ul><li>Develop persistent awareness of the nations infrastructure (support to the NICC) </li></ul></ul><ul><ul><li>Enable timely decisions to protect, secure, analyze, and restore the nations infrastructure </li></ul></ul><ul><ul><li>Enable informed actionable decisions to protect, secure, analyze, and restore the nations infrastructure </li></ul></ul><ul><li>MISSION: </li></ul><ul><li>Lead the Department’s efforts to provide standardized, relevant, and customer-focused infrastructure information to homeland security partners. </li></ul><ul><li>GOALS: </li></ul><ul><li>Ensure infrastructure information collection processes, procedures, and tools support the implementation and sustainment of a comprehensive risk-management program </li></ul><ul><li>Develop an infrastructure information collection management process to coordinate requirements to support our mission partners and customers. </li></ul><ul><li>Provide leadership, collaboration, and support in establishing partnership within the infrastructure information management community . </li></ul><ul><li>Ensure appropriate open access to OIP CI/KR infrastructure information </li></ul><ul><li>Instill discipline in the design and implementation of processes and technologies to collect infrastructure information </li></ul><ul><li>Provide a work environment that values and encourages our workforce and drives organizational excellence </li></ul>Mission Vision Goals
    8. 8. IICD Organization Roles & Responsibilities Administrative Assistant Division Director Deputy Division Director <ul><li>Mission Management: Develop policies and procedures for the submission and dissemination of infrastructure data </li></ul><ul><li>Requirements Management: Establish and implement a Requirements Process and approval board to consolidate and prioritize information and intelligence requirements. Defines ‘what’ to collect </li></ul><ul><li>Collection Management: Establish and implement a process for collection of information based on requirements and available resources; identify sources of industry-accepted information. Defines ‘how’ to collect data. </li></ul><ul><li>Establish data format standards to facilitate information collection, exchange, and dissemination </li></ul><ul><li>Coordinate with external partners (SASSD, PSCD) to disseminate information and ensure requirements are met </li></ul><ul><li>Provides capability and functionality requirements, and data standards to for tool design and development. </li></ul><ul><li>IT/System support to ensure coordination and integration of projects with DHS-level IT requirements. Includes </li></ul><ul><ul><li>Enterprise Architecture </li></ul></ul><ul><ul><li>Certification & Accreditation </li></ul></ul><ul><ul><li>Approval Board (EAB, ERB) </li></ul></ul><ul><li>Project Evaluation and Assessment supports PMs and COTRs is managing contract costs and schedules, establishing performance-based metrics and milestones, and coordinating with DHS PA&E to achieve project approvals </li></ul><ul><li>Business Support Team: Develops division funding requirements for out-years and implements procurement actions. </li></ul><ul><li>Human Resource support to ensure personnel vacancies are filled with qualified applicants; coordinates professional development and training courses for employees. </li></ul><ul><li>Policy Support: Field external information requests and assists in developing strategic guidance/ vision </li></ul>IICP Program Management Office Information Management Branch Mission Support Branch <ul><li>Manage development of the Geospatial tools to support DHS’ Infrastructure Protection, Security, and Restoration mission areas. </li></ul><ul><li>Provide PM support for iCAV. </li></ul><ul><li>Provide geospatial services to IP: </li></ul><ul><ul><li>Analysis </li></ul></ul><ul><ul><li>Production </li></ul></ul><ul><ul><li>Training </li></ul></ul><ul><li>Contract GA Support - (ESRI) </li></ul><ul><li>Collaborate with the DHS GMO to establish geospatial data format standards to facilitate information collection, exchange, and dissemination </li></ul><ul><li>Identify and prioritize capability and functionality requirements for tool development. </li></ul><ul><li>Project Task Managers and COTRs manage program and contract schedules and costs using EVMS. </li></ul><ul><li>Develop and implement procurement actions to enable tool development. </li></ul>Geospatial Program Office <ul><li>Manage infrastructure information collection programs and the projects to development and maintain their respective technology components: </li></ul><ul><ul><li>Assessment Tools </li></ul></ul><ul><ul><li>User Interface </li></ul></ul><ul><ul><li>Data Warehouse </li></ul></ul><ul><ul><li>Systems Integration </li></ul></ul><ul><ul><li>Help Desk Support </li></ul></ul><ul><li>Develop a process-oriented approach for tools requirements and align with data classifications and policies specified by the Information Management Branch </li></ul><ul><li>Manage the integration of infrastructure information collection tools and all investment documentation requirements </li></ul><ul><li>Develop and implement procurement actions to enable tool development. </li></ul><ul><li>Support the technological development of IICP tools and integration with project management disciplines, including EVMS. </li></ul>D S s
    9. 9. Overview of Risk Analysis CONSEQUENCE (C) (a.k.a. Criticality) – Estimate of what could happen to people, the economy, national psyche, or mission capability VULNERABILITY (V) Estimate of how easy or difficult it would be to successfully attack the asset and, in so doing, yield the most severe consequences THREAT (T) Application of threat to the asset, in terms of enemy Capability and Intent, well-informed by both consequence & vulnerability values “ [W]e cannot protect every single person against every single threat at every moment and in every place. We have to, with our finite resources and our finite number of employees, we have to be able to focus ourselves on those priorities which most demand our attention. And that means we have to focus on risk. And what does that mean?  It means we look to consequence, it means we look to vulnerability, and it means we look to threat.” Secretary Chertoff, July 25, 2005
    10. 10. Infrastructure Information Collection Program (IICP) <ul><li>Collects, catalogs, and maintains standardized and quantifiable risk-related infrastructure information to enable the execution of national risk management. </li></ul><ul><li>IICP will integrate at least four existing projects to reduce duplication and facilitate information collection through the implementation of a distributed architecture </li></ul><ul><ul><li>Automated Critical Asset Management Systems (ACAMS) </li></ul></ul><ul><ul><ul><li>Web-based tool enabling collection of infrastructure and risk information from </li></ul></ul></ul><ul><ul><ul><li>Owners/operators, law enforcement and first responders at State and Local level </li></ul></ul></ul><ul><ul><li>Vulnerability Identification Self Assessment Tool (VISAT) </li></ul></ul><ul><ul><ul><li>Tool for owners/operators of non-complex assets to assess their facility risk through standard methodologies and common metrics to enable cross-sector comparisons </li></ul></ul></ul><ul><ul><li>CI/KR Risk Assessment Methodology Technology Implementation </li></ul></ul><ul><ul><ul><li>Implementation of sector specific methodologies into tools to support within sector risk analysis and the collection of asset information </li></ul></ul></ul><ul><ul><li>National Asset Database (NADB) </li></ul></ul><ul><ul><ul><li>Repository of infrastructure information </li></ul></ul></ul>
    11. 11. IICP Planned Capabilities <ul><li>A focused CI/KR information management system in which quantifiable variables required for risk analysis, CIP planning, and decisions are collected, consolidated, and presented to inform DHS leadership and other CIP partners </li></ul><ul><li>Capabilities and Functions: </li></ul><ul><ul><li>Integrates existing collection processes </li></ul></ul><ul><ul><li>Drive asset information collection through standard risk methodologies </li></ul></ul><ul><ul><li>Data standards established for information collected </li></ul></ul><ul><ul><li>Incentives to CI/KR owners and operators to submit information on their assets </li></ul></ul><ul><ul><li>Infrastructure data is accessible via a common graphics user interface </li></ul></ul><ul><ul><li>Infrastructure data is accessible to meet the mission requirements of DHS components and inform long term CIP strategic planning </li></ul></ul><ul><ul><li>Establish requirements-based Collection Management process </li></ul></ul><ul><ul><li>Geospatially enabled with integration into iCAV </li></ul></ul>
    12. 12. Constellation / ACAMS <ul><li>Constellation/ACAMS is a web-enabled system focused at the state and local level for the collection and effective use of asset data, protection information, and incident response and recovery plans pertaining to infrastructure. </li></ul><ul><ul><li>Purpose to facilitate the identification, prioritization and collection of CI/KR assets. </li></ul></ul><ul><ul><li>Focus on collecting and communicating necessary local information required by incident commander both pre-incident (protection plans, operational guides) and post-incident (response, recovery) </li></ul></ul><ul><li>Program capabilities include: </li></ul><ul><ul><li>Comprehensive Training program </li></ul></ul><ul><ul><li>Open source information and news feeds (Constellation) </li></ul></ul><ul><ul><li>Library of vulnerability and risk assessments and reports </li></ul></ul><ul><ul><li>Information to support strategic planner and tactical commanders </li></ul></ul>
    13. 13. ACAMS Tools and Capabilities <ul><li>A core asset management system that implements a database for critical asset information focusing on the unique requirements and information needs of first responders </li></ul><ul><li>Vulnerability and consequence scoring tools that aid the user’s subjective analysis of criticality </li></ul><ul><li>An integrated information portal, Constellation, tying together critical assets data and reporting about the current threat environment </li></ul><ul><li>A complete reporting capability to answer both local and national-level data calls on critical assets </li></ul><ul><li>Automated generation of Buffer Zone Protection Plans (BZPPs) </li></ul><ul><li>Automated generation of pre-incident operational plans for local police and first responders </li></ul><ul><li>Electronically available resources for first responders, such as the Field Operations Guide (FOG) and the Response Information Folder (RIF) </li></ul><ul><li>Integrated Geospatial Information System for use in collection process and analysis </li></ul>
    14. 14. Constellation/ACAMS Incorporates these Principles in an Information System for Identifying, Prioritizing and Cataloging Critical Assets – Focusing on the Information Needed by First Responders: <ul><li>Buffer </li></ul><ul><li>Zone </li></ul><ul><li>Plan </li></ul>Inventory Process Asset Management Questionnaire Stage Initial Assessment Visit Highly Critical Assets Non - Critical And Uncategorized Assets Small Number of Critical Sites – Highly Detailed High Number of Sites - Only Basic Information Collected
    15. 15. Constellation / ACAMS <ul><li>System is operational in CA, with a limited pilot expansion that began in October 2006. </li></ul><ul><ul><li>Representatives from 25 States have attended training </li></ul></ul><ul><ul><li>“ Train the Trainer” curriculum under development </li></ul></ul><ul><li>National roll-out will facilitate future data calls or DHS information requests to State and Local jurisdictions. </li></ul><ul><li>System integration with IICP capabilities will enable more efficient analysis for determination of inclusion of infrastructures in the Tier One/ Two program </li></ul>
    16. 16. Trained by State – near future 480 36 12 34 5 12 4 15 4 10 51 DC (48) MD (9) MA (35) 7 1 1 3 2 CT (4) 9 4 24 10 5 DE (7) 5 5 5 5 769 Trained by AUG 07
    17. 17. <ul><ul><li>Using a distributed architecture, the IDW evolves from the National Asset Database (NADB) to integrate independent databases </li></ul></ul><ul><ul><ul><li>Provides for a more robust and complete data set </li></ul></ul></ul><ul><ul><ul><li>Reduces duplication of effort and distributes information maintenance </li></ul></ul></ul><ul><ul><li>Primary repository of the knowledge necessary to implement risk-informed infrastructure and resource protection activities </li></ul></ul><ul><ul><li>The IDW contains: </li></ul></ul><ul><ul><ul><li>A comprehensive catalogue of the assets that comprise the Nation’s infrastructure </li></ul></ul></ul><ul><ul><ul><li>All pertinent information about those assets (e.g. address, facility type, owner’s name and phone number, consequence and vulnerability information) </li></ul></ul></ul><ul><ul><li>These items can be quickly searched in a variety of manners to support rapid identification of those assets of greatest interest or at the greatest risk depending on the circumstances </li></ul></ul><ul><ul><li>Establishing a collection management process to collect infrastructure information based on stakeholder requirements </li></ul></ul>Integrated Data Warehouse (IDW)
    18. 18. <ul><ul><li>The IDW is not simply a list of our nation’s “most critical” assets and resources </li></ul></ul><ul><ul><ul><li>Risk is dynamic, and thus what is “critical” today may not necessarily be “critical” tomorrow. Accordingly, an all-encompassing inventory is required. </li></ul></ul></ul><ul><ul><li>The IDW is not static. It is a continually evolving system to support the Department’s risk analysis in a changing threat environment. </li></ul></ul><ul><ul><ul><li>DHS is actively seeking additional assets from other Federal agencies, State and Local governments, and other entities for inclusion into the NADB </li></ul></ul></ul><ul><ul><li>DHS is not excluding any asset from the IDW </li></ul></ul><ul><ul><ul><li>Every asset that a state, territory, federal agency, or private sector member provides will be entered into the database upon request </li></ul></ul></ul><ul><ul><ul><li>The IDW will display all available information held within existing databases once integrated </li></ul></ul></ul>The IDW: What It Is Not
    19. 19. Sources of Information <ul><ul><li>DHS is employing a multi-pronged approach to populate the IDW with data about the nation’s infrastructure and resources: </li></ul></ul><ul><ul><ul><li>Formal data calls to States and Territories </li></ul></ul></ul><ul><ul><ul><li>Identification and integration of existing federal agency databases </li></ul></ul></ul><ul><ul><ul><ul><li>National Inventory of Dams (NID) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Risk Management Plan (RMP) </li></ul></ul></ul></ul><ul><ul><ul><li>Incorporation of information collected as part of other DHS initiatives, such as: </li></ul></ul></ul><ul><ul><ul><ul><li>Automated Critical Asset Management System (ACAMS) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Risk Analysis and Management for Critical Asset Protection (RAMCAP) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Site Assistance Visits </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Buffer Zone Protection Plans </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Comprehensive Reviews </li></ul></ul></ul></ul><ul><ul><ul><li>Collection of voluntary private sector and industry input </li></ul></ul></ul><ul><ul><ul><li>Procurement of commercial and private databases </li></ul></ul></ul><ul><ul><ul><ul><li>Homeland Security Infrastructure Program (HSIP) </li></ul></ul></ul></ul><ul><ul><li>Information not received as part of other DHS initiatives is validated for accuracy </li></ul></ul>
    20. 20. GCOA Report
    21. 21. Risk Analysis and Management Technology Implementation (RAM-TI) <ul><li>The RAM-TI program are tools for private sector owners and operators to assess facility risk through standard methodologies and common metrics to enable cross-sector risk comparisons. </li></ul><ul><li>RAM-TI includes: </li></ul><ul><ul><li>Risk Analysis and Management for Critical Asset Protection (RAMCAP) to assess complex infrastructures </li></ul></ul><ul><ul><li>Vulnerability Self Assessment Tool (ViSAT) methodologies and standards to assess non-complex infrastructures. </li></ul></ul><ul><ul><li>Sector –specific methodologies as identified by the SSA (JATT, RAM-W) </li></ul></ul><ul><li>Five RAMCAP Technical Specification documents written for: </li></ul><ul><ul><ul><li>Commercial Nuclear Power </li></ul></ul></ul><ul><ul><ul><li>Nuclear Spent Fuel </li></ul></ul></ul><ul><ul><ul><li>Petroleum Refineries </li></ul></ul></ul><ul><li>Two RAMCAP Technical Specification documents in development: </li></ul><ul><ul><li>Dams, Locks and Levees / Water Sector </li></ul></ul><ul><ul><ul><li>Chemical Manufacturing </li></ul></ul></ul><ul><ul><ul><li>LNG storage </li></ul></ul></ul>
    22. 22. Integrated Common Analytical Viewer (iCAV) <ul><li>Integration Platform </li></ul><ul><li>Enhanced with a Services Oriented Architecture (SOA) approach, iCAV provides a consistent geospatial context for viewing threat, asset and vulnerability information. </li></ul><ul><li>Geospatial Capabilities </li></ul><ul><li>Based on ESRI Products, iCAV is a web-enabled, DHS-owned analytical Geospatial tool </li></ul><ul><li>Licenses </li></ul><ul><li>In partnership w/ NGA, data is licensed to “Homeland Security / Homeland Defense Partners” </li></ul><ul><li>Common View </li></ul><ul><li>Permitting state and local users access to iCAV provides a common view of geo-referenced information and helps reduce inconsistencies </li></ul><ul><li>Service Platform </li></ul><ul><li>Web services deployed from iCAV allow integration with other SOA-enabled system </li></ul><ul><li>Role Based </li></ul><ul><li>i CAV provides the capability to permit or restrict access to specific layers of data based on a variety of criteria including user, location as well as business rules presented by remote systems </li></ul>Providing operational, situational and strategic awareness capabilities for Preparedness, Response & Recovery supporting the Homeland Security Mission
    23. 23. iCAV Users / Integration <ul><li>Vertical Integration </li></ul><ul><ul><li>DHS </li></ul></ul><ul><ul><ul><li>Federal Situational Awareness </li></ul></ul></ul><ul><ul><ul><li>National Asset Information </li></ul></ul></ul><ul><ul><li>State </li></ul></ul><ul><ul><ul><li>EOC </li></ul></ul></ul><ul><ul><ul><li>Fusion Centers </li></ul></ul></ul><ul><ul><li>Local </li></ul></ul><ul><ul><ul><li>First Responders </li></ul></ul></ul><ul><ul><ul><li>Local Law Enforcement </li></ul></ul></ul><ul><li>Horizontal Integration </li></ul><ul><ul><li>DHS – Multi Component </li></ul></ul><ul><ul><ul><li>Situational Awareness </li></ul></ul></ul><ul><ul><ul><li>Event & Activity Data </li></ul></ul></ul><ul><ul><li>State EOC/Fusion Centers </li></ul></ul><ul><ul><ul><li>Situational Awareness </li></ul></ul></ul><ul><ul><ul><li>State monitored activities </li></ul></ul></ul><ul><ul><li>Local First Responders </li></ul></ul><ul><ul><ul><li>Response/Recovery Resource Coordination </li></ul></ul></ul>
    24. 24. Geospatially Integrate DHS Databases <ul><li>Integration of DHS Databases </li></ul><ul><ul><li>iCAV/HSIP </li></ul></ul><ul><ul><ul><li>IICP </li></ul></ul></ul><ul><ul><ul><li>Master Watch Control Log </li></ul></ul></ul><ul><ul><ul><li>NBIS Lite </li></ul></ul></ul><ul><ul><ul><li>COP </li></ul></ul></ul><ul><ul><ul><li>LENS </li></ul></ul></ul><ul><ul><ul><li>NGA, USGS, FEMA Web Mapping Services </li></ul></ul></ul><ul><ul><ul><li>Additional Integration w/ Sensors, Data and Video </li></ul></ul></ul><ul><li>Establish Inter-system Governance </li></ul><ul><ul><li>Define rules to expand our ability to share data </li></ul></ul><ul><ul><li>Defined user profiles </li></ul></ul><ul><li>Establish Initial Identity Management Capability </li></ul><ul><ul><li>iCAV system leverages the authentication capabilities of the Homeland Security Information Network (HSIN). </li></ul></ul><ul><ul><li>A single sign on for ease of use </li></ul></ul>
    25. 25. iCAV Viewer showing full global view.  Critical Infrastructure Categories in left hand column
    26. 26. NBIS Lite Integration NBIS - Bio-surveillance data on H5N1 detection based on open source information. 
    27. 27. LENS Integration - Regional US View showing locations of completed Buffer Zone Protection Plans, Comprehensive Reviews, Site Assistance Visits and other PREP/OIP/RMD products.
    28. 28. Clicking a BZPP Icon launches LENS showing the actual reports for that particular asset.
    29. 29. Hurricane support - Hurricane data obtained from NOAA resulting in a forecast cone for Alberto, 2006
    30. 30. Hurricane data for Alberto overlaid with Nuclear Power Plants.  Used to produce impact reports.
    31. 31. Real time video integration – iCAV showing locations of static video cameras as well as UAV video feeds
    32. 32. Clicking a camera icon retrieves and displays the video from the source camera or UAV
    33. 33. NOC COP integration - iCAV integrated as the Geospatial platform for the DHS National Operating Center COP
    34. 34. IICP System Current State <ul><li>A coherent plan to move forward with system integration </li></ul><ul><ul><li>Includes functional requirements for systems integration </li></ul></ul>ACAMS ViSAT S/W Security Everywhere ANL Rapid Ingest process ORNL iCAV @ Stennis PSC LENS IDW LandScan CSAT S/W Unique ID
    35. 35. IICS End State FY08 (IOC) Enterprise Service Bus Core messaging and interaction services are provided by a single set of integrated components Geospatial Viewer Supports multi-perspective, multi-device location-based end user interfaces. Common, interoperable geospatial functionality is packaged as discrete services which can be reused across the Department Process Management Utility services are invoked in a particular sequence to provide meaningful location-based business functionality Utility Services Common, interoperable tool functionality is packaged as discrete services which can be reused across Federal, State and Local governments and sectors System Integration Access to DHS and HLS enterprise geospatial applications and data sources is provided via standards-based interfaces NOC COP ViSAT Sector RAT State VAT Others Services Analytical Tools PDA DAMS / RAM-W Enterprise Coverage Repositories Ops Data <ul><li>Infrastructure Situational/Strategic Awareness </li></ul><ul><li>Preparedness/Risk </li></ul><ul><li>Incident Reporting </li></ul><ul><li>Threat Analysis </li></ul><ul><li>Response/Recovery </li></ul>Lexis Nexis Sector DB LENS Imagery Elevation NICC NOC COP USACE GIS-Analysis/Mapping (iCAV) (Unclas/Secret/Top Secret) Future integration – Development by DHS, NGA, National Labs etc Threat iCAV - Current Implementation ACAMS LandScan HSIP Gold Enterprise Infrastructure Data Warehouse Orchestration Transformation Security Management Transport Presentation Smooth user feel, easily downloadable products, and role based <ul><li>Common Graphics User Interface </li></ul><ul><li>Single Sign On to multiple tools </li></ul><ul><li>Secure Web Based Portal </li></ul><ul><li>Intuitive Navigation </li></ul><ul><li>Google like search/categorization </li></ul>
    36. 36. Timeline Apr May Jun Sep FY07 Aug Jul Oct FY08 Sep FY08 1 <ul><li>Final Plan </li></ul>30 <ul><li>ACAMS/iCAV Integration </li></ul><ul><li>Replicate ACAMS (PSC) </li></ul><ul><li>Establish IICS dev sys. </li></ul><ul><li>CSAT SW </li></ul><ul><li>ViSAT SW </li></ul><ul><li>RIP </li></ul><ul><li>Land Scan </li></ul><ul><li>Integrated GUI </li></ul>SECURITY MD 1400 Customer Engagement Policy Development 15 <ul><li>Contract </li></ul>Nov FY09 <ul><li>IOC SECRET </li></ul><ul><li>FOCSBU </li></ul>FY10 <ul><li>FOC SECRET </li></ul><ul><li>IOC TS/COOP </li></ul>FY11 <ul><li>FOC TS/COOP </li></ul>iCAV Integration <ul><li>IOC SBU </li></ul>
    37. 37. IICP Next Steps <ul><li>IICP System Integration </li></ul><ul><ul><li>Plan completed by 18 May 07 </li></ul></ul><ul><ul><li>Immediate implementation 1 Jun 07 </li></ul></ul><ul><li>Data integration </li></ul><ul><ul><li>Work with DHS components, States, SSAs to identify additional data integration and utilization requirements </li></ul></ul><ul><li>iCAV System Enhancement </li></ul><ul><ul><li>Fully implement a Services Oriented Architecture (SOA) fulfilling mission requirement for collaboration </li></ul></ul><ul><ul><li>Continue ACAMS integration (expected completion 15 July) </li></ul></ul><ul><li>Training </li></ul><ul><ul><li>Continue ACAMS Train-the-Trainer curriculum development </li></ul></ul><ul><ul><li>Develop CBT ACAMS refresher training </li></ul></ul><ul><ul><li>IICP System training </li></ul></ul><ul><li>Roll Out </li></ul><ul><ul><li>Continue limited National roll out </li></ul></ul>
    38. 38. Questions?