Command, Control and Interoperability Division: Difference between revisions

Content deleted Content added
article expansion, citation updates
m Cleaning up a randomly generated list, typo(s) fixed: nation’s → nation's (2)
Line 5:
}}
 
The '''Command, Control and Interoperability Division''' is a bureau of the [[United States]] [[Department of Homeland Security]]'s Science and Technology Directorate, run by Dr. David Boyd. This division is responsible for creating informative resources(including standards, frameworks, tools, and technologies) that strengthen communications interoperability, improve Internet security, and integrity and accelerate the development of automated capabilities to help identify potential threats to the U.S. The purpose of this division is to enable seamless and secure interactions among homeland security stakeholders. This means enhancing the ability of owners to communicate, share, visualize, analyze and protect information through this practitioner-driven approach. The Command, Control and Interoperability Division's vision is for stakeholders to have comprehensive, real-time, and relevant information to create and maintain a secure and safe nation.<ref name="dhs.gov">https://www.dhs.gov/xabout/structure/gc_1224532340996.shtm</ref>
 
The division took over most of the functions envisioned by the U.S. Congress for the Office of Emergency Communications (OEC), which was under the Cybersecurity and Communications unit created by the [[Homeland Security Appropriations Act|Homeland Security Appropriations Act (2007).]]<ref>{{Cite book|title=Public Safety Communications and Spectrum Resources: Policy Issues for Congress|last=Moore|first=Linda|publisher=Congressional Research Service|year=2009|isbn=9781437924695|___location=Washington, D.C.|pages=26}}</ref> These included the coordination of emergency communications planning, preparedness, and response. This particular area serves as the basis for the division's involvement in developing protocols for [[Emergency service|emergency responders]].<ref>{{Cite book|title=Introduction to Homeland Security: Principles of All-Hazards Risk Management|last=Bullock|first=Jane|last2=Haddow|first2=George|last3=Coppola|first3=Damon|publisher=Elsevier|year=2009|isbn=9781856175098|___location=Burlington, MA|pages=553}}</ref>
 
Customers include local, tribal, state, federal, international, and private emergency response agencies; agencies that plan for, detect, and respond to hazards; and private-sector partners that own, operate, and maintain the nation's cyber infrastructure.<ref>https://www. name="dhs.gov"/xabout/structure/gc_1224532340996.shtm</ref>
[[File:Seal of the United States Department of Homeland Security.svg|thumb|]]
 
Line 24:
The Visual Analytics and Precision Information Environments Program uses visually based mathematical methods and computational algorithms to discover, manipulate, or comprehend diverse data. The program also conducts research on novel advanced technologies and techniques for understanding and manipulating information in multiple forms or modes. These techniques tend to include text, video, images, audio, databases, and sensor data. The knowledge found through this program helps to anticipate terrorist incidents and/or catastrophic events.<ref>https://www.dhs.gov/files/programs/gc_1218474924792.shtm#30</ref>
 
The Discrete-Element Computing, Privacy, and Forensics Program consists of software algorithms and hardware architectures that access, process and manage multiple types and modes of information. This program assesses threats and consequences, ensuring information privacy and securing the cyber infrastructure while protecting telecommunications interoperability.<ref name="cyber.st.dhs.gov">http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf</ref> The Discrete-Element Computing, Privacy, and Forensics Program provides real-time data analysis and decision support against potential threats and imminent disasters.<ref>https://www.dhs.gov/files/programs/gc_1218474924792.shtm#10</ref>
 
===Cyber security===
The CCID Cyber Security Program Area is run by Dr. Douglas Maughan. The program specializes in cyber-security research, development, testing, and evaluation in order to decrease the amount of economic and national security threats on our nation. This will help secure the nation’snation's current and future critical cyber infrastructure in support of the [[Department of Homeland Security]] operational missions and the priorities established in the president’spresident's National Strategy to Secure Cyberspace.<ref>http://www. name="cyber.st.dhs.gov"/public/CATCH/Boyd.pdf</ref>
 
Cyber Security has three program areas within the overall program: Information Infrastructure Security (IIS), Cyber Security Research Tools and Techniques (RTT), and Next Generation Technologies (NGT.) <ref>http://www. name="cyber.st.dhs.gov"/public/CATCH/Boyd.pdf</ref>
 
There were also separate activities and programs within the Cyber Security program area. These consist of Defense Technology Experimental Research (DETER)Testbed: Department of Homeland Security Secure Wireless Access Prototype (DSWAP: Domain Name System Security Extensions (DNSSEC) Project: IronKey: Linking the Oil and Gas Industry to Improve Cyber Security (LOGIIC): Project 25 Compliance Assessment Program (P25 CAP): Protected Repository for the Defense of Infrastructure against Cyber Threats (PREDICT.)