Content deleted Content added
changed {{no footnotes}} to {{more footnotes}} & general fixes using AWB (8097) |
m →Five Program Areas: grammar |
||
Line 6:
[[File:US Department of Homeland Security Seal.svg|thumb|]]
==Five
The CCID is managed by the [[DHS Directorate for Science and Technology]]. This division works to accomplish
===Basic/Futures Research===
The Basic/Futures Research program area is led by Dr. Joseph Kielman. The program was put in place to conduct long
Within the Basic/Futures Research Program
The Visual Analytics and Precision Information Environments Program uses visually based mathematical methods and computational algorithms to discover, manipulate, or comprehend diverse data. The program also conducts research on novel advanced technologies and techniques for understanding and manipulating information in multiple forms or modes. These techniques tend to include text, video, images, audio, databases, and sensor data. The knowledge found through this program helps to anticipate terrorist incidents and/or catastrophic events.<ref>http://www.dhs.gov/files/programs/gc_1218474924792.shtm#30</ref>
Line 18:
The Discrete-Element Computing, Privacy, and Forensics Program consists of software algorithms and hardware architectures that access, process and manage multiple types and modes of information. This program assesses threats and consequences, ensuring information privacy and securing the cyber infrastructure while protecting telecommunications interoperability.<ref>http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf</ref> The Discrete-Element Computing, Privacy, and Forensics Program provides real-time data analysis and decision support against potential threats and imminent disasters.<ref>http://www.dhs.gov/files/programs/gc_1218474924792.shtm#10</ref>
===Cyber
The CCID Cyber Security Program Area is run by Dr. Douglas Maughan. The program specializes in
Cyber Security has three program areas within the overall program: Information Infrastructure Security (IIS), Cyber Security Research Tools and Techniques (RTT), and Next Generation Technologies (NGT.) <ref>http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf</ref>
Line 34:
This program area is led and run by John Price. This area researches develops technologies that aid in the discovery, investigation, and the prosecution of terrorists and criminals. There are also separate programs and activities within the CID Reconnaissance, Surveillance, and Investigative Technologies Program Area.
One is the Digital Ink Library Project. This project is led by Shane Cullen and was successfully transitioned to the United States Secret Service (USSS) in January 2009. The CID worked with United States Secret Service (USSS) forensic investigators to enhance mission effectiveness by digitizing the complete archive of ink samples. As a result, ink sample matching takes seconds as opposed to hours or days, and irreplaceable inks remain secure.
Another project is the RealEyes Project. RealEyes is a cutting-edge technology that enables personal digital assistant (PDA) devices or cell phones to send real-time video and
==Notes==
|