Homeland Security Information Sharing Architecture · Agenda wObjectives wApproach wArchitecture...

12
1 UNCLASSIFIED UNCLASSIFIED Homeland Security Information Sharing Architecture National Defense Industrial Association Interoperability and Systems Integration Conference 2 April 2003 William F. Dawson Deputy Intelligence Community Chief Information Officer

Transcript of Homeland Security Information Sharing Architecture · Agenda wObjectives wApproach wArchitecture...

1UNCLASSIFIED

UNCLASSIFIED

Homeland SecurityInformation Sharing

Architecture

National Defense Industrial AssociationInteroperability and Systems

Integration Conference2 April 2003

William F. DawsonDeputy Intelligence Community

Chief Information Officer

2

UNCLASSIFIED

UNCLASSIFIED

Agendaw Objectivesw Approachw Architecturew Information Sharingw Summary

3

UNCLASSIFIED

UNCLASSIFIED

Objectivesw Use existing capabilities and infrastructures

to support the analytical and informationdissemination needs of Homeland Securityw Provide actionable access to informationw Provide a roadmap for future system

development which ensures interoperabilityacross the Federal Government and beyond

4

UNCLASSIFIED

UNCLASSIFIED

Approachw Interconnect a Homeland Security

Community of Interest (COI) at each securitylevel:

Ø Top Secret SCIØ Secret CollateralØ Sensitive but Unclassified (SBU)

w Establish a governance process at eachsecurity level:

Ø PoliciesØ Standards

5

UNCLASSIFIED

UNCLASSIFIED

Intelligence Community System forInformation Sharing (ICSIS)w Provides the enterprise capabilities to store,

manage and disseminate HS information using:n Joint Worldwide Intelligence Communications System

(JWICS) for Top Secret connectivityn Secret Internet Protocol Routed Network (SIPRNET)

for Secret connectivityn Open Source Information System (OSIS) for

Unclassified/SBU connectivity

IC Enterprise Architecture

6

UNCLASSIFIED

UNCLASSIFIED

Intelligence Community System forInformation Sharing (ICSIS)w Provides the controlled interfaces to securely

transfer HS data to analysts at lower securitylevelsw Provides a governance structure for sensitive

compartmented information

IC Enterprise Architecture

7

UNCLASSIFIED

UNCLASSIFIED

Homeland Security Architecture

CollateralSpace

CRL

IC PKI

CommonServices

CA

SCICommunity

Space

PKI

HS SensitiveSpace

HSCOI

ICAgencies

CollateralSpace

IC PKI providesIdentification and authentication for HS COI users.

DoD PKI providesIdentification and authentication for HS COI users.

HS

HSCOI

Controlled InterfaceEnables transfer ofData from CollateralTo HS Sensitive

ControlledInterface

Controlled InterfaceEnables transfer ofData from SCITo Collateral

ControlledInterface

Intelink-S

HSShared

Data

Servers/Apps

Collaboration

SCI COI

HSShared

Data

Servers/Apps

Collaboration

SECRET COI

HSShared

Data

Servers/Apps

Collaboration

Unclass COI

SCI Network (JWICS) Collateral Network (SIPRNET) Unclassified Network (OSIS)

PKI

Commercial PKI providesIdentification and authentication for HS COI users.

CRLCRL

IC PKIIC PKI

CommonServices

CA

SCICommunity

Space

HSCOI

PKI

CollateralSpace

CRLCRL

IC PKIIC PKI

CommonServices

CA

SCICommunity

Space

PKIPKI

HS SensitiveSpace

HSCOI

ICAgencies

CollateralSpace

IC PKI providesIdentification and authentication for HS COI users.

DoD PKI providesIdentification and authentication for HS COI users.

HS

HSCOI

Controlled InterfaceEnables transfer ofData from CollateralTo HS Sensitive

ControlledInterface

Controlled InterfaceEnables transfer ofData from SCITo Collateral

ControlledInterface

Intelink-S

HSShared

Data

Servers/Apps

Collaboration

SCI COI

HSShared

Data

Servers/Apps

Collaboration

SECRET COI

HSShared

Data

Servers/Apps

Collaboration

Unclass COI

SCI Network (JWICS) Collateral Network (SIPRNET) Unclassified Network (OSIS)

PKI

Commercial PKI providesIdentification and authentication for HS COI users.

CRLCRL

IC PKIIC PKI

CommonServices

CA

SCICommunity

Space

HSCOI

PKI

8

UNCLASSIFIED

UNCLASSIFIED

TS/SCI Infrastructurew Managed by the Intelligence Community

n Takes full advantage of the existing ICSIS andComms infrastructure

n CT-Link provides an existing operational SecureCommunity of Interest:w Profiled cable/message reports/trafficw Community products (Warnings, Assessments)w Community databases

n Examples: State, FBI, CIA, etc.w E-Mailw Tailored Forums (bulletin boards)

Sharing SensitiveCompartmented Information

9

UNCLASSIFIED

UNCLASSIFIED

Collateral Infrastructurew Managed by Defense Department (and

others)n Takes full advantage of the DoD’s existing Secret

infrastructuren Takes full advantage of Secret version of Intelinkn Communities of Interest for Homeland Security

can be establishedn One department (e.g., Defense) could lead a

governance activity

Sharing CollateralInformation

10

UNCLASSIFIED

UNCLASSIFIED

Sensitive but UnclassifiedInfrastructurew Managed by Department of Homeland

Security (and others)n Takes full advantage of the existing Federal

Government infrastructure, includingw DOJ/FBI’s Law Enforcement Networksw DoD’s Unclassified Networksw State’s SBU Networksw IC’s Unclassified Networks

n Communities of Interest for Homeland Securitycan be established

n One Department (e.g., DHS) could lead agovernance activity

SharingUnclassified Information

11

UNCLASSIFIED

UNCLASSIFIED

Homeland SecurityInformation Sharing

Business Rules

Business Rules

Sources and MethodsSensitive Data

Actionable Data

Classified InformationActionable Data

Actionable Data

Existing Capabilities

TOP S

ECRE

T

SECR

ET

UNCL

ASS

/SBU

Information Flow

Emerging Capabilities

Controlled Interface

Controlled Interface

Unc

lass

ified

Rep

ortin

g an

d Fe

edba

ck

Participants

LE andDomesticAgencies

IC Analysts

DoD

Operators

Data

Military andotherSecretLevel

ForeignIntelligence

LawEnforcement

andDomestic

Governance

IC

DHS +

DoD +

12

UNCLASSIFIED

UNCLASSIFIED

Summaryw Existing operational capabilities and IT

infrastructures can and are being leveragedto support the analytical and informationdissemination needs of DHSw Actionable information and connectivity is

required at three distinct security levelsw Coordinated governance processes will

facilitate timely exchange of HomelandSecurity information