NATIONAL SECURITY
THROUGHRESPONSIBLE
INFORMATION SHARING
Kshemendra PaulProgram Manager, Information Sharing Environment
February 2013
2
MISSIONAdvance responsible information sharing to further counterterrorism and homeland security missions
Improve nationwide decision making by transforming information ownership to stewardship
Promote partnerships across federal, state, local, and tribal governments, the private sector, and internationally
VISIONNational security through responsible information sharing
SCOPE
3
Diplomacy
Homeland Security
Intelligence
Defense
Law Enforcement
Frontline• Investigato
rs• Analysts• Operators
FederalState
LocalTribalPrivate Sector
International
Mis
sion
Par
tner
s
Com
mu
nit
ies Informatio
nSharing
Environment
(ISE)
Information Technology Industry
Hom
eland S
ecuri
ty
Terr
ori
smW
MD
Cla
ssifi
ed
Info
rmati
on
Cyb
er…
CONTEXT
4
Executive Order 13587
Executive Order 13388
Presidential Guidelines
IRTPAIntelligence Reform and Terrorism Protection Act of 2004
Markle Task Force
2007 National Strategy
2012 National Strategy
5
Principles:
• Information as a national asset.
• Information sharing and safeguarding requires
shared risk management.
• Information informs decision making.
DOMESTIC ISENational Approaches to Interoperability
Integrated Capabilities & Shared Services
Common Operating Models
Multiple Missions & Authorities
Crushing Financial Pressures
Evolving & Converging threats
80,000Agencies750,000+
Officers
250,000911 Operators1.2 million
Firefighters
2.2 million Security Officers
18 CI/KR Sectors* Numbers are estimates
300+ millionPeople
77 Fusion Centers
28 HITDAs8 RISS Centers
FBIFIGs ▫ JTTFs ▫ JRIGsDHS
I&A ▫ ICE ▫ CBP ▫ DNDO ▫ NPPD
Maritime Domain
NCTC ITACG
Air DomainDoD
NORTHCOM
DOJATF ▫ DEA ▫ OJP
6Protection of Privacy, Civil Rights, and Civil Liberties
INVESTIGATORS ANALYSTS OPERATORS
PROACTIVE DECISION MAKING
7
CHIEF EXECUTIVE OFFICERS
ALIGNED ACTION
Safe & Effective Operations
Cases Connected & Solved
Threat & VulnerabilityAssessments
Frontline
Agency Heads
◘ Threats, vulnerabilities
◘ Risk management
◘ Resource allocation
◘ Suspicious activity reporting
◘ Alerts, warnings, and notifications
◘ Requests for information
◘ Event, case, & subject deconfliction
◘ Cyber incident reporting & response
◘ Other mission processes
TARGETED CAPABILITIES
8
Trusted interoperable networks
User access,authorization & control Distributed correlation
across data sets
Cross-organization information sharing agreements & policy enforcementShared IT &
analytic services
Performance & compliance feedback
Timely, quality dataInformation Access & discovery
Translation
National Information Exchange Model
STANDARDIZING DATA MOVING ACROSS SYSTEMS
IN
TE
RF
AC
E
LEGACYDATABASES
LEGACYDATABASES
COMMONLY FORMATTED
DATA
IN
TE
RF
AC
E
IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT
10
Enabling trust and interoperability for more effective information sharing
S TA T E W I D E I S E : N E W J E R S E Y C A S E S T U D Y
ROIC
State Agencies
County Agencies
Local Agencies
Nat’l Fusion Center Net
External Partners
Private Sector
UASI OHSP
OEM
FBI JTTF
NSI
Federal Partners
NJ CJ Agencies
New York
NYC PA CT
State Partners
NJ LE
NJ-ISEEnterprise
NJSP
Standards Based Services Interaction• Shared Services• Info Exchange
FUTURE
12
Cyber Security
Statewide ISE: Race to the Top
Standards-Based Acquisition . . .
LEARN MORE
13
Standards-Based Acquisition • TODAY: Advancing Information Sharing
Through Procurement Innovation w/ Vijay Mehra3:15pm in the Woods Room
ISE Case Study• TOMORROW: New York State Integrated
Justice Portal w/ Vijay Mehra11:45am in the Birch Room
PLUG IN
PUBLIC SECTOR
INDUSTRY ASSOCIATIONS
STANDARDS DEVELOPMENT ORGANIZATIONS
15
VISIT ISE.GOV
16
@shareandprotect
Top Related