Content deleted Content added
Replacing US_Department_of_Homeland_Security_Seal.svg with File:Seal_of_the_United_States_Department_of_Homeland_Security.svg (by CommonsDelinker because: File renamed: standardizing template). |
|||
Line 1:
{{Multiple issues|
{{Cleanup|date=July 2010}}
{{More footnotes|date=July 2010}}
{{Orphan|date=July 2016}}
The '''Command, Control and Interoperability Division''' is a bureau of the [[United States]] [[Department of Homeland Security]]'s Science and Technology Directorate, run by Dr.David Boyd. This division is responsible for creating informative resources(including standards, frameworks, tools, and technologies) that strengthen communications interoperability, improve Internet security, and integrity and accelerate the development of automated capabilities to help identify potential threats to the U.S. The purpose of this division is to enable seamless and secure interactions among homeland security stakeholders. This means enhancing the ability of owners to communicate, share, visualize, analyze and protect information through this practitioner-driven approach. The Command, Control and Interoperability Division's vision is for stakeholders to have comprehensive, real-time, and relevant information to create and maintain a secure and safe nation.<ref>http://www.dhs.gov/xabout/structure/gc_1224532340996.shtm</ref>▼
}}
▲The '''Command, Control and Interoperability Division''' is a bureau of the [[United States]] [[Department of Homeland Security]]'s Science and Technology Directorate, run by Dr.David Boyd. This division is responsible for creating informative resources(including standards, frameworks, tools, and technologies) that strengthen communications interoperability, improve Internet security, and integrity and accelerate the development of automated capabilities to help identify potential threats to the U.S. The purpose of this division is to enable seamless and secure interactions among homeland security stakeholders. This means enhancing the ability of owners to communicate, share, visualize, analyze and protect information through this practitioner-driven approach. The Command, Control and Interoperability Division's vision is for stakeholders to have comprehensive, real-time, and relevant information to create and maintain a secure and safe nation.<ref>
Customers include local, tribal, state, federal, international, and private emergency response agencies; agencies that plan for, detect, and respond to hazards; and private-sector partners that own, operate, and maintain the nation's cyber infrastructure.<ref>http://www.dhs.gov/xabout/structure/gc_1224532340996.shtm</ref>▼
▲Customers include local, tribal, state, federal, international, and private emergency response agencies; agencies that plan for, detect, and respond to hazards; and private-sector partners that own, operate, and maintain the nation's cyber infrastructure.<ref>
[[File:Seal of the United States Department of Homeland Security.svg|thumb|]]
Line 12 ⟶ 16:
The Basic/Futures Research program area is led by Dr. Joseph Kielman. The program was put in place to conduct long-term, fundamental research in support of CCID. It also strives to advance technologies that can serve the department and the local, tribal, state, federal, and international partners. This program area also develops and fosters a research community to identify and demonstrate novel information discovery, analysis, and management concepts and capabilities. This enables the division to identify, assess, minimize or prevent the impact of terrorist attacks and natural or man made disasters.
Within the Basic/Futures Research Program are actually two programs. The first is known as the Visual Analytics and Precision Information Environments Program; he second includes the Discrete-Element Computing, Privacy, and Forensics Program.
The Visual Analytics and Precision Information Environments Program uses visually based mathematical methods and computational algorithms to discover, manipulate, or comprehend diverse data. The program also conducts research on novel advanced technologies and techniques for understanding and manipulating information in multiple forms or modes. These techniques tend to include text, video, images, audio, databases, and sensor data. The knowledge found through this program helps to anticipate terrorist incidents and/or catastrophic events.<ref>
The Discrete-Element Computing, Privacy, and Forensics Program consists of software algorithms and hardware architectures that access, process and manage multiple types and modes of information. This program assesses threats and consequences, ensuring information privacy and securing the cyber infrastructure while protecting telecommunications interoperability.<ref>http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf</ref> The Discrete-Element Computing, Privacy, and Forensics Program provides real-time data analysis and decision support against potential threats and imminent disasters.<ref>
===Cyber security===
Line 32 ⟶ 36:
===Reconnaissance, Surveillance, and Investigative Technologies===
This program area is led and run by John Price. This area researches develops technologies that aid in the discovery, investigation, and the prosecution of terrorists and criminals. There are also separate programs and activities within the CID Reconnaissance, Surveillance, and Investigative Technologies Program Area.
One is the Digital Ink Library Project. This project is led by Shane Cullen and was successfully transitioned to the United States Secret Service (USSS) in January 2009. The CID worked with United States Secret Service (USSS) forensic investigators to enhance mission effectiveness by digitizing the complete archive of ink samples. As a result, ink sample matching takes seconds as opposed to hours or days, and irreplaceable inks remain secure.
Another project is the RealEyes Project. RealEyes is a cutting-edge technology that enables personal digital assistant (PDA) devices or cell phones to send real-time video and geo-spatial coordinates, view live video from a fixed or mobile camera, control fixed cameras, and immediately stream video from a PDA.{{
==Notes==
Line 42 ⟶ 46:
==External links==
* [
* [http://www.heritage.org/Research/Reports/2010/07/Classrooms-for-Security-Harnessing-Academia-to-Keep-America-Safe Heritage Foundation article on DHS]
*[http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf Command, Control and Interoperability Division]
|