Command, Control and Interoperability Division: Difference between revisions

Content deleted Content added
Michalge (talk | contribs)
No edit summary
Removed cleanup tag
 
(25 intermediate revisions by 22 users not shown)
Line 1:
{{Short description|Bureau of the US Department of Homeland Security}}[[File:Seal of the United States Department of Homeland Security.svg|thumb|Seal of the United States Department of Homeland Security]]
{{Cleanup|date=July 2010}}
The '''Command, Control and Interoperability Division''' is a bureau of the [[United States]] [[Department of Homeland Security]]'s Science and Technology Directorate, run by Dr.David Boyd. This division is responsible for creating informative resources (including standards, frameworks, tools, and technologies) that strengthen communications interoperability, improve Internet security, and integrity and accelerate the development of automated capabilities to help identify potential threats to the U.S.<ref Thename="dhs.gov">{{Cite purposeweb of this division is to enable seamless and secure interactions among homeland security stakeholders|url=https://www.dhs.gov/xabout/structure/gc_1224532340996.shtm |title=DHS This&#124; means enhancing the ability of owners to communicate, share, visualize, analyzeScience and protect information through this practitioner-driven approach. Technology TheDirectorate Command, Control and Interoperability Division's vision|access-date=2016-07-29 is for stakeholders to have comprehensive, real|archive-time, and relevant information to create and maintain a secure and safe nationurl=https://web. <ref>archive.org/web/20120118075109/http://www.dhs.gov/xabout/structure/gc_1224532340996.shtm |archive-date=2012-01-18 |url-status=dead }}</ref>
{{No footnotes|date=July 2010}}
The '''Command, Control and Interoperability Division''' is a bureau of the [[United States]] [[Department of Homeland Security]]'s Science and Technology Directorate, run by Dr.David Boyd. This division is responsible for creating informative resources(including standards, frameworks, tools, and technologies) that strengthen communications interoperability, improve Internet security, and integrity and accelerate the development of automated capabilities to help identify potential threats to the U.S. The purpose of this division is to enable seamless and secure interactions among homeland security stakeholders. This means enhancing the ability of owners to communicate, share, visualize, analyze and protect information through this practitioner-driven approach. The Command, Control and Interoperability Division's vision is for stakeholders to have comprehensive, real-time, and relevant information to create and maintain a secure and safe nation. <ref>http://www.dhs.gov/xabout/structure/gc_1224532340996.shtm </ref>
 
The division took over most of the functions envisioned by the U.S. Congress for the Office of Emergency Communications (OEC), which was under the Cybersecurity and Communications unit created by the [[Homeland Security Appropriations Act|Homeland Security Appropriations Act (2007).]]<ref>{{Cite book|title=Public Safety Communications and Spectrum Resources: Policy Issues for Congress|last=Moore|first=Linda|publisher=Congressional Research Service|year=2009|isbn=9781437924695|___location=Washington, D.C.|pages=26}}</ref> These included the coordination of emergency communications planning, preparedness, and response. This particular area serves as the basis for the division's involvement in developing protocols for [[Emergency service|emergency responders]].<ref>{{Cite book|title=Introduction to Homeland Security: Principles of All-Hazards Risk Management|last1=Bullock|first1=Jane|last2=Haddow|first2=George|last3=Coppola|first3=Damon|publisher=Elsevier|year=2009|isbn=9781856175098|___location=Burlington, MA|pages=553}}</ref>
Customers include local, tribal, state, federal, international, and private emergency response agencies; agencies that plan for, detect, and respond to hazards; and private-sector partners that own, operate, and maintain the nation's cyber infrastructure.<ref>http://www.dhs.gov/xabout/structure/gc_1224532340996.shtm </ref>
 
Customers include local, tribal, state, federal, international, and private emergency response agencies; agencies that plan for, detect, and respond to hazards; and private-sector partners that own, operate, and maintain the nation's cyber infrastructure.<ref>http://www. name="dhs.gov"/xabout/structure/gc_1224532340996.shtm </ref>
[[File: DHSlogo[1].gif|thumb|Department of Homeland Security]]
 
==Five Programprogram Areasareas==
The CCID is managed by the [[DHS Directorate for Science and Technology]]. This division works to accomplish it'sits mission of creating and deploying information resources to enable seamless and secure interactions among homeland security stakeholders. TheIt CCIDis also the primary research and development organization of the DHS and is organizedheaded throughby fivethe programUnder areasSecretary for Science and Technology.<ref name=":0">{{Cite Basic/Futuresbook|title=Federal Research; Cyberand Security;Development KnowledgeFunding: ManagementFy Tools;2010|last=Sargent|first=John|publisher=Congressional OfficeResearch Service|year=2010|isbn=9781437922691|___location=Washington, D.C.|pages=20}}</ref> In 2010, this directorate requested for Interoperability$968 andmillion,<ref Compatibility;name=":0" and/> which included the proposed $15 million increase to the $74.9 million funding the ReconnaissanceCommand, SurveillanceControl, and InvestigativeInteroperability TechnologiesDivision was allocated in 2009.<ref>{{Cite book|title=DHS Directorate of Science and Technology: Key Issues for Congress|last1=Shea|first1=Dana|last2=Morgan|first2=Daniel|publisher=DIANE Publishing|year=2009|isbn=9781437922530|___location=Washington, D.C.|pages=50}}</ref>
 
The CCID is organized through five program areas: Basic/Futures Research; Cyber Security; Knowledge Management Tools; Office for Interoperability and Compatibility; and Reconnaissance, Surveillance, and Investigative Technologies.
 
===Basic/Futures Research===
The Basic/Futures Research program area is led by Dr. Joseph Kielman. The program was put in place to conduct long -term, fundamental research in support of CCID. It also strives to advance technologies that can serve the department and the local, tribal, state, federal, and international partners. This program area also develops and fosters a research community to identify and demonstrate novel information discovery, analysis, and management concepts and capabilities. This enables the division to identify, assess, minimize or prevent the impact of terrorist attacks and natural or man made disasters.
 
Within the Basic/Futures Research Program isare actually two programs. The first is known as the Visual Analytics and Precision Information Environments Program; he second includes the Discrete-Element Computing, Privacy, and Forensics Program.
 
The Visual Analytics and Precision Information Environments Program uses visually- based mathematical methods and computational algorithms to discover, manipulate, or comprehend diverse data. The program also conducts research on novel advanced technologies and techniques for understanding and manipulating information in multiple forms or modes. These techniques tend to include text, video, images, audio, databases, and sensor data. The knowledge found through this program helps to anticipate terrorist incidents and/or catastrophic events. <ref>{{Cite web |url=https://www.dhs.gov/files/programs/gc_1218474924792.shtm#30 |title=DHS &#124; Command, Control and Interoperability Programs and Projects |access-date=2016-07-29 |archive-url=https://web.archive.org/web/20120305162235/http://www.dhs.gov/files/programs/gc_1218474924792.shtm#30 |archive-date=2012-03-05 |url-status=dead }}</ref>
 
The Discrete-Element Computing, Privacy, and Forensics Program consists of software algorithms and hardware architectures that access, process and manage multiple types and modes of information. This program assesses threats and consequences, ensuring information privacy and securing the cyber infrastructure while protecting telecommunications interoperability.<ref> name="cyber.st.dhs.gov">http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf {{Bare URL PDF|date=March 2022}}</ref> The Discrete-Element Computing, Privacy, and Forensics Program provides real-time data analysis and decision support against potential threats and imminent disasters. <ref>{{Cite web |url=https://www.dhs.gov/files/programs/gc_1218474924792.shtm#10 |title=DHS &#124; Command, Control and Interoperability Programs and Projects |access-date=2016-07-29 |archive-url=https://web.archive.org/web/20120305162235/http://www.dhs.gov/files/programs/gc_1218474924792.shtm#10 |archive-date=2012-03-05 |url-status=dead }}</ref>
 
===Cyber Securitysecurity===
The CCID Cyber Security Program Area is run by Dr. Douglas Maughan. The program specializes in cybersecuritycyber-security research, development, testing, and evaluation in order to decrease the amount of economic and national security threats on our nation. This will help secure the nation’snation's current and future critical cyber infrastructure in support of the [[Department of Homeland Security]] operational missions and the priorities established in the president’spresident's National Strategy to Secure Cyberspace. <ref> http://www.name="cyber.st.dhs.gov"/public/CATCH/Boyd.pdf</ref>
 
Cyber Security has three program areas within the overall program: Information Infrastructure Security (IIS), Cyber Security Research Tools and Techniques (RTT), and Next Generation Technologies (NGT.) <ref> http://www.name="cyber.st.dhs.gov"/public/CATCH/Boyd.pdf</ref>
 
There were also separate activitesactivities and programs within the Cyber Security program area. These consist of Defense Technology Experimental Research (DETER)Testbed: Department of Homeland Security Secure Wireless Access Prototype (DSWAP: Domain Name System Security Extensions (DNSSEC) Project: IronKey: Linking the Oil and Gas Industry to Improve Cyber Security (LOGIIC): Project 25 Compliance Assessment Program (P25 CAP): Protected Repository for the Defense of Infrastructure against Cyber Threats (PREDICT.)
 
=== Knowledge Management Tools===
The Knowledge Management Tools program area of Command, Control, and Interoperability is led by Dr. John Hoyt and provides knowledge management capabilities to reduce the risk of terrorist attacks, prepare for natural and man-made disasters, and provide an effective response to these disasters. Knowledge Management Tools also develops new tools, devices, and methods to process and analyze massive amounts of information that are widely dispersed and are found in multiple forms. It is important for this program area to work collaboratively to complement efforts in the intelligence, law enforcement, and homeland securities communities.
 
=== Office for Interoperability and Compatibility ===
Line 33 ⟶ 34:
 
===Reconnaissance, Surveillance, and Investigative Technologies===
This progamprogram area is leadled and run by John Price. This area researches developesdevelops technologies that aid in the discovery, investigation, and the prosecution of terrorists and criminals. There are also separate programs and activities within the CID Reconnaissance, Surveillance, and Investigative Technologies Program Area.
 
One is the Digital Ink Library Project. This project is leadled by Shane Cullen and was successfully transitioned to the United States Secret Service (USSS) in January 2009. The CID worked with United States Secret Service (USSS) forensic investigators to enhance mission effectiveness by digitizing the complete archive of ink samples. As a result, ink sample matching takes seconds as opposed to hours or days, and irreplaceable inks remain secure.
 
Another project is the RealEyes Project. RealEyes is a cutting-edge technology that enables personal digital assistant (PDA) devices or cell phones to send real-time video and geospatialgeo-spatial coordinates, view live video from a fixed or mobile camera, control fixed cameras, and immediately stream video from a PDA.{{citation needed|date=February 2013}}
 
==Notes==
{{Reflist|30em}}
==External links==
* [http://www.dhs.gov/xabout/structure/gc_1224532340996.shtm Command, Control and Interoperability Division official government website]
* [http://www.heritage.org/Research/Reports/2010/07/Classrooms-for-Security-Harnessing-Academia-to-Keep-America-Safe Heritage Foundation article on DHS]
*[http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf Command, Control and Interoperability Division]
[[Category:United States Department of Homeland Security]]
[[Category:Government of the United States]]
[[Category:Article Feedback Pilot]]
 
[[Category:GovernmentFederal government of the United States]]
 
[[FileCategory:United States DHSlogo[1].gif|thumb|Department of Homeland Security]]
{{government-stub}}