Command, Control and Interoperability Division

Last updated
Seal of the United States Department of Homeland Security Seal of the United States Department of Homeland Security.svg
Seal of the United States Department of Homeland Security

The Command, Control and Interoperability Division is a bureau of the United States Department of Homeland Security's Science and Technology Directorate. This division is responsible for creating informative resources (including standards, frameworks, tools, and technologies) that strengthen communications interoperability, improve Internet security, and integrity and accelerate the development of automated capabilities to help identify potential threats to the U.S. [1]

Contents

The division took over most of the functions envisioned by the U.S. Congress for the Office of Emergency Communications (OEC), which was under the Cybersecurity and Communications unit created by the Homeland Security Appropriations Act (2007). [2] These included the coordination of emergency communications planning, preparedness, and response. This particular area serves as the basis for the division's involvement in developing protocols for emergency responders. [3]

Customers include local, tribal, state, federal, international, and private emergency response agencies; agencies that plan for, detect, and respond to hazards; and private-sector partners that own, operate, and maintain the nation's cyber infrastructure. [1]

Five program areas

The CCID is managed by the DHS Directorate for Science and Technology. This division works to accomplish its mission of creating and deploying information resources to enable seamless and secure interactions among homeland security stakeholders. It is also the primary research and development organization of the DHS and is headed by the Under Secretary for Science and Technology. [4] In 2010, this directorate requested for $968 million, [4] which included the proposed $15 million increase to the $74.9 million funding the Command, Control, and Interoperability Division was allocated in 2009. [5]

The CCID is organized through five program areas: Basic/Futures Research; Cyber Security; Knowledge Management Tools; Office for Interoperability and Compatibility; and Reconnaissance, Surveillance, and Investigative Technologies.

Basic/Futures Research

The Basic/Futures Research program area is led by Dr. Joseph Kielman. The program was put in place to conduct long-term, fundamental research in support of CCID. It also strives to advance technologies that can serve the department and the local, tribal, state, federal, and international partners. This program area also develops and fosters a research community to identify and demonstrate novel information discovery, analysis, and management concepts and capabilities. This enables the division to identify, assess, minimize or prevent the impact of terrorist attacks and natural or man made disasters.

Within the Basic/Futures Research Program are actually two programs. The first is known as the Visual Analytics and Precision Information Environments Program; he second includes the Discrete-Element Computing, Privacy, and Forensics Program.

The Visual Analytics and Precision Information Environments Program uses visually based mathematical methods and computational algorithms to discover, manipulate, or comprehend diverse data. The program also conducts research on novel advanced technologies and techniques for understanding and manipulating information in multiple forms or modes. These techniques tend to include text, video, images, audio, databases, and sensor data. The knowledge found through this program helps to anticipate terrorist incidents and/or catastrophic events. [6]

The Discrete-Element Computing, Privacy, and Forensics Program consists of software algorithms and hardware architectures that access, process and manage multiple types and modes of information. This program assesses threats and consequences, ensuring information privacy and securing the cyber infrastructure while protecting telecommunications interoperability. [7] The Discrete-Element Computing, Privacy, and Forensics Program provides real-time data analysis and decision support against potential threats and imminent disasters. [8]

Cyber security

The CCID Cyber Security Program Area is run by Dr. Douglas Maughan. The program specializes in cyber-security research, development, testing, and evaluation in order to decrease the amount of economic and national security threats on our nation. This will help secure the nation's current and future critical cyber infrastructure in support of the Department of Homeland Security operational missions and the priorities established in the president's National Strategy to Secure Cyberspace. [7]

Cyber Security has three program areas within the overall program: Information Infrastructure Security (IIS), Cyber Security Research Tools and Techniques (RTT), and Next Generation Technologies (NGT.) [7]

There were also separate activities and programs within the Cyber Security program area. These consist of Defense Technology Experimental Research (DETER)Testbed: Department of Homeland Security Secure Wireless Access Prototype (DSWAP: Domain Name System Security Extensions (DNSSEC) Project: IronKey: Linking the Oil and Gas Industry to Improve Cyber Security (LOGIIC): Project 25 Compliance Assessment Program (P25 CAP): Protected Repository for the Defense of Infrastructure against Cyber Threats (PREDICT.)

Knowledge Management Tools

The Knowledge Management Tools program area of Command, Control, and Interoperability is led by Dr. John Hoyt and provides knowledge management capabilities to reduce the risk of terrorist attacks, prepare for natural and man-made disasters, and provide an effective response to these disasters. Knowledge Management Tools also develops new tools, devices, and methods to process and analyze massive amounts of information that are widely dispersed and are found in multiple forms.

Office for Interoperability and Compatibility

The CCID Office for Interoperability and Compatibility is led by Karen Ray. This program area works with emergency response communities and federal partners to improve local, tribal, state, and federal emergency preparedness and response. It also strengthens interoperable wireless communications and improves effective information sharing by developing tools and technologies, to enhance overall planning and coordination at all levels of government through both voice and data. A mission of the Office for Interoperability and Compatibility is to help emergency responders manage incidents and exchange information in real time.

Reconnaissance, Surveillance, and Investigative Technologies

This program area is led and run by John Price. This area researches develops technologies that aid in the discovery, investigation, and the prosecution of terrorists and criminals. There are also separate programs and activities within the CID Reconnaissance, Surveillance, and Investigative Technologies Program Area.

One is the Digital Ink Library Project. This project is led by Shane Cullen and was successfully transitioned to the United States Secret Service (USSS) in January 2009. The CID worked with United States Secret Service (USSS) forensic investigators to enhance mission effectiveness by digitizing the complete archive of ink samples. As a result, ink sample matching takes seconds as opposed to hours or days, and irreplaceable inks remain secure.

Another project is the RealEyes Project. RealEyes is a cutting-edge technology that enables personal digital assistant (PDA) devices or cell phones to send real-time video and geo-spatial coordinates, view live video from a fixed or mobile camera, control fixed cameras, and immediately stream video from a PDA.[ citation needed ]

Notes

  1. 1 2 "DHS | Science and Technology Directorate Command, Control and Interoperability Division". Archived from the original on 2012-01-18. Retrieved 2016-07-29.
  2. Moore, Linda (2009). Public Safety Communications and Spectrum Resources: Policy Issues for Congress. Washington, D.C.: Congressional Research Service. p. 26. ISBN   9781437924695.
  3. Bullock, Jane; Haddow, George; Coppola, Damon (2009). Introduction to Homeland Security: Principles of All-Hazards Risk Management. Burlington, MA: Elsevier. p. 553. ISBN   9781856175098.
  4. 1 2 Sargent, John (2010). Federal Research and Development Funding: Fy 2010. Washington, D.C.: Congressional Research Service. p. 20. ISBN   9781437922691.
  5. Shea, Dana; Morgan, Daniel (2009). DHS Directorate of Science and Technology: Key Issues for Congress. Washington, D.C.: DIANE Publishing. p. 50. ISBN   9781437922530.
  6. "DHS | Command, Control and Interoperability Programs and Projects". Archived from the original on 2012-03-05. Retrieved 2016-07-29.
  7. 1 2 3 http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf [ bare URL PDF ]
  8. "DHS | Command, Control and Interoperability Programs and Projects". Archived from the original on 2012-03-05. Retrieved 2016-07-29.

Related Research Articles

<span class="mw-page-title-main">United States Department of Homeland Security</span> United States federal department

The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cyber security, and disaster prevention and management.

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Specifically, US-CERT is a branch of the Office of Cybersecurity and Communications' (CS&C) National Cybersecurity and Communications Integration Center (NCCIC).

<span class="mw-page-title-main">National Cyber Security Division</span>

The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency. Formed from the Critical Infrastructure Assurance Office, the National Infrastructure Protection Center, the Federal Computer Incident Response Center, and the National Communications System, NCSD opened on June 6, 2003. The NCSD mission is to collaborate with the private sector, government, military, and intelligence stakeholders to conduct risk assessments and mitigate vulnerabilities and threats to information technology assets and activities affecting the operation of the civilian government and private sector critical cyber infrastructures. NCSD also provides cyber threat and vulnerability analysis, early warning, and incident response assistance for public and private sector constituents. NCSD carries out the majority of DHS’ responsibilities under the Comprehensive National Cybersecurity Initiative. The FY 2011 budget request for NCSD is $378.744 million and includes 342 federal positions. The current director of the NCSD is John Streufert, former chief information security officer (CISO) for the United States Department of State, who assumed the position in January 2012.

<span class="mw-page-title-main">Homeland Security Act of 2002</span> Post-9/11 United States law establishing the Department of Homeland Security

The Homeland Security Act (HSA) of 2002, was introduced in the aftermath of the September 11 attacks and subsequent mailings of anthrax spores. The HSA was cosponsored by 118 members of Congress. The act passed the U.S. Senate by a vote of 90–9, with one Senator not voting. It was signed into law by President George W. Bush in November 2002.

Homeland Security Advanced Research Projects Agency (HSARPA) is a part of the Science and Technology Directorate at the United States Department of Homeland Security. Much like DARPA in the Department of Defense, HSARPA is tasked with advanced projects to advance the technology needed to protect the US. Some of the chief beneficiaries of HSARPA are the Customs and Border Protection, and the Office of Intelligence and Analysis.

The Institute for Information Infrastructure Protection (I3P) is a consortium of national cyber security institutions, including academic research centers, U.S. federal government laboratories, and nonprofit organizations, all of which have long-standing, widely recognized expertise in cyber security research and development (R&D). The I3P is managed by The George Washington University, which is home to a small administrative staff that oversees and helps direct consortium activities.

<span class="mw-page-title-main">DHS Science and Technology Directorate</span> U.S. Dept. of Homeland Security Research and Development units

The Science and Technology Directorate (S&T) is a component within the United States Department of Homeland Security. DHS-S&T serves as the research and development arm of the Department as it fulfills its national security mission.

<span class="mw-page-title-main">DHS Chemical and Biological Defense Division</span>

The Chemical and Biological Defense Division (CBD) is a division of the Science and Technology Directorate of the United States Department of Homeland Security. Within the Homeland Security Advanced Research Projects Agency, CBD develops technologies to increase the United States's preparedness and protect key national infrastructure against chemical, biological, and agricultural threats and disasters through improved threat awareness and advanced surveillance, detection, and protective countermeasures.

According to the DHS S&T website, the Command, Control, and Interoperability Division was a unit of the DHS Science and Technology Directorate which "develops interoperable communication standards and protocols for emergency responders, cyber security tools for protecting the integrity of the Internet, and automated capabilities to recognize and analyze potential threats."

<span class="mw-page-title-main">DHS Infrastructure Protection and Disaster Management Division</span>

The Infrastructure Protection and Disaster Management Division (IDD) is a division of the Science and Technology Directorate of the United States Department of Homeland Security. Within the Homeland Security Advanced Research Projects Agency, IDD develops technologies to improve and increase the United States' strategic preparedness response to natural and man-made threats through situational awareness, emergency response capabilities, and critical infrastructure protection.

The EINSTEIN System is a network intrusion detection and prevention system that monitors the networks of US federal government departments and agencies. The system is developed and managed by the Cybersecurity and Infrastructure Security Agency in the United States Department of Homeland Security (DHS).

<span class="mw-page-title-main">Department of Defense Cyber Crime Center</span>

The Department of Defense Cyber Crime Center (DC3) is designated as a Federal Cyber Center by National Security Presidential Directive 54/Homeland Security Presidential Directive 23, as a Department of Defense (DoD) Center Of Excellence for Digital and Multimedia (D/MM) forensics by DoD Directive 5505.13E, and serves as the operational focal point for the Defense Industrial Base (DIB) Cybersecurity program. DC3 operates as a Field Operating Agency (FOA) under the Inspector General of the Department of the Air Force.

Emergency management software is the software used by local, state and federal emergency management personnel to deal with a wide range of disasters and can take many forms. For example, training software such as simulators are often used to help prepare first responders, word processors can keep form templates handy for printing and analytical software can be used to perform post-hoc examinations of the data captured during an incident. All of these systems are interrelated, as the results of an after-incident analysis can then be used to program training software to better prepare for a similar situation in the future. Crisis Information Management Software (CIMS) is the software found in emergency management operation centers (EOC) that supports the management of crisis information and the corresponding response by public safety agencies.

The Stephenson Disaster Management Institute at Louisiana State University is located in the Stephenson National Center for Security Research and Training at LSU.

<span class="mw-page-title-main">DHS Cyber Security Division</span>

The Cyber Security Division (CSD) is a division of the Science and Technology Directorate (S&T Directorate) of the United States Department of Homeland Security (DHS). Within the Homeland Security Advanced Research Projects Agency, CSD develops technologies to enhance the security and resilience of the United States' critical information infrastructure from acts of terrorism. S&T supports DHS component operational and critical infrastructure protections, including the finance, energy, and public utility sectors, as well as the first responder community.

<span class="mw-page-title-main">National Cybersecurity and Critical Infrastructure Protection Act of 2013</span>

The National Cybersecurity and Critical Infrastructure Protection Act of 2013 is a bill that would amend the Homeland Security Act of 2002 to require the Secretary of the Department of Homeland Security (DHS) to conduct cybersecurity activities on behalf of the federal government and would codify the role of DHS in preventing and responding to cybersecurity incidents involving the Information Technology (IT) systems of federal civilian agencies and critical infrastructure in the United States.

Code Dx, Inc. was an American software technology company active from 2015 to 2021. The company's flagship product, Code Dx, is a vulnerability management system that combines and correlates the results generated by a wide variety of static and dynamic testing tools. In 2021, the company was acquired by Synopsys.

The National Cybersecurity and Communications Integration Center (NCCIC) is part of the Cybersecurity Division of the Cybersecurity and Infrastructure Security Agency, an agency of the U.S. Department of Homeland Security. It acts to coordinate various aspects of the U.S. federal government's cybersecurity and cyberattack mitigation efforts through cooperation with civilian agencies, infrastructure operators, state and local governments, and international partners.

Phyllis Schneck is an American executive and cybersecurity professional. As of May 2017, she became the managing director at Promontory Financial Group. Schneck served in the Obama administration as Deputy Under Secretary for Cybersecurity and Communications for the National Protection and Programs Directorate (NPPD), at the Department of Homeland Security.

<span class="mw-page-title-main">Cybersecurity and Infrastructure Security Agency</span> Agency of the United States Department of Homeland Security

The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cybersecurity programs with U.S. states, and improving the government's cybersecurity protections against private and nation-state hackers.