Automated Trusted Information Exchange

Last updated

Automated Trusted Information Exchange (ATIX) is a computer database containing homeland security and terrorist threat information, which is part of the U.S. government's Regional Information Sharing Systems (RISS) program. [1] [2]

See also

Related Research Articles

Computer security Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

United States Department of Homeland Security United States federal department

The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cyber security, and disaster prevention and management.

Surveillance Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information, such as Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Interac Canadian interbank network

Interac is a Canadian interbank network that links financial institutions and other enterprises for the purpose of exchanging electronic financial transactions. Interac serves as the Canadian debit card system and the predominant funds transfer network via its e-Transfer service. There are over 59,000 automated teller machines that can be accessed through the Interac network in Canada, and over 450,000 merchant locations accepting Interac debit payments.

Depository Trust & Clearing Corporation American post-trade financial services company providing clearing and settlement services

The Depository Trust & Clearing Corporation (DTCC) is an American post-trade financial services company providing clearing and settlement services to the financial markets. It performs the exchange of securities on behalf of buyers and sellers and functions as a central securities depository by providing central custody of securities.

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Specifically, US-CERT is a branch of the Office of Cybersecurity and Communications' (CS&C) National Cybersecurity and Communications Integration Center (NCCIC).

Homeland Security Act of 2002 Post-9/11 United States law establishing the Department of Homeland Security

The Homeland Security Act (HSA) of 2002, was introduced in the aftermath of the September 11 attacks and subsequent mailings of anthrax spores. The HSA was cosponsored by 118 members of Congress. The act passed the U.S. Senate by a vote of 90–9, with one Senator not voting. It was signed into law by President George W. Bush in November 2002.

Colombo Stock Exchange Main stock exchange of Sri Lanka, located in Colombo

The Colombo Stock Exchange (CSE) is the main stock exchange in Sri Lanka. It is provides an electronic trading platform. The headquarters of the CSE have been located at the World Trade Center (Colombo) Towers in Colombo since 1995 and it also has branches across the country in Kandy, Jaffna, Negombo, Matara, Kurunegala, Anuradhapura and Ratnapura. The Colombo Stock Exchange (CSE) has 296 companies representing 20 business sectors. As of 25 January 2021, with a Market Capitalization of Rs. 3,699 Billion.

Nairobi Securities Exchange Stock exchange of Nairobi, Kenya

The Nairobi Securities Exchange (NSE) was established in 1954 as the Nairobi Stock Exchange, based in Nairobi the capital of Kenya. It was a voluntary association of stockbrokers in the European community registered under the Societies Act in British Kenya.

A custodian bank, or simply custodian, is a specialized financial institution responsible for safeguarding a brokerage firm's or individual's financial assets and is not engaged in "traditional" commercial or consumer/retail banking such as mortgage or personal lending, branch banking, personal accounts, Automated Teller Machines (ATMs) and so forth. The role of a custodian in such a case would be to:

The Joint Regional Information Exchange System (JRIES) began in December 2002 as an all-source intelligence / information sharing system, designed initially as a grassroots pilot system to connect the California Anti-Terrorism Information Center, the New York Police Department, and the Defense Intelligence Agency (DIA).

EINSTEIN was originally an intrusion detection system that monitors the network gateways of government departments and agencies in the United States for unauthorized traffic. The software was developed by the United States Computer Emergency Readiness Team (US-CERT), which is the operational arm of the National Cyber Security Division (NCSD) of the United States Department of Homeland Security (DHS). The program was originally developed to provide "situational awareness" for the civilian agencies. While the first version examined network traffic and subsequent versions examined content, the current version of EINSTEIN is significantly more advanced.

A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. Cybercriminals typically tamper with the manufacturing process of a product by installing a rootkit or hardware-based spying components. In an Internet Security Threat Report, powered by Symantec, it is stated that supply chain attacks still continue to be a feature of the threat landscape, with an increase by 78 percent in 2018.

Global Trade Exchange

The Global Trade Exchange (GTX) is, or was, a controversial Homeland Security intelligence project, related to maritime-ports data-mining, being one of three pillars of the Safe Ports Act-related Secure Freight Initiatives. The Global Trade Exchange has a mysterious history dating from conception in 2004, a 2007-2008 year of hype, and sudden placement on "hold" status. Described as a ready-to-buy, commercially available database, the GTX was rush-funded by Congress as part of and championed relentlessly by then-United States Secretary of Homeland Security Michael Chertoff in evident disregard of objections of confused and frustrated U.S. private sector trade groups. After a year-long spate of official support, media hype, and after award of Congressional funding of $13 million, the GTX was put "on hold for further study by the [U.S.] Navy" in April 2008, for reasons still yet to-be explained. Touted by senior U.S. officials and Congress in 2007 as an anti-terrorism database for tracking long-haul shipping containers, the Global Trade Exchange's principal focus appears to have a different focus, notably advance trade-finance information for market-making purposes.

The Importer Security Filing (ISF) also referred to as 10+2, is a customs import requirement of the United States Customs and Border Protection (CBP) ; which requires containerized cargo information, for security purposes, to be transmitted to the agency at least 24 hours (19 CFR section 149.2 before goods are loaded onto an ocean vessel headed to the U.S. for shipment into the U.S. 10+2 is pursuant to section 203 of the SAFE Port Act, and requires importers to provide 10 data elements to CBP, as well as 2 more data documents from the carrier.

Regional Information Sharing Systems (RISS) is an information-sharing program funded by the U.S. Federal government whose purpose is to connect databases from local and regional law enforcement so that they can use each other's data for criminal investigations.

The National Criminal Intelligence Sharing Plan (NCISP) is an intelligence-sharing initiative that links the computer databases of local, state, regional, tribal law enforcement agencies with those of the U.S. federal government.

The Homeland Security Information Network (HSIN) is a web-based platform, run by the Department of Homeland Security, which is designed to allow local, state, tribal, and federal government agencies to share "Sensitive But Unclassified (SBU)" information with each other over a secure channel.

Virtual USA (vUSA), is a joint federal and state collaboration on a project that would allow state and local on-line tools and technologies, such as caches of geospatial data, to be interoperable and more useful with the goal of creating a "Virtual USA" for emergency response purposes. The initiative was developed by the DHS Directorate for Science and Technology (S&T), and currently operates as a pilot in eight states — Alabama, Georgia, Florida, Louisiana, Mississippi, Texas, Virginia and Tennessee — with plans to incorporate additional states.

Indicator of compromise (IoC) in computer forensics is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion.

References

  1. "Automated Trusted Information Exchange (ATIX)". ATIX (official site). Archived from the original on 23 March 2010. Retrieved 17 December 2009.
  2. Harris, William. "Homeland Security Information Network: Moving Past the Missteps Toward Better Information Sharing" (PDF). Testimony to U.S. House of Representatives. Archived (PDF) from the original on 2 December 2009. Retrieved 18 December 2009.