The Homeland Security Information Network (HSIN) is a web-based platform, run by the Department of Homeland Security, which is designed to allow local, state, tribal, and federal government agencies to share "Sensitive But Unclassified (SBU)" information with each other over a secure channel. [1] [2] [3]
The HSIN provides three main functional categories. First, it provides a SharePoint web portal system which allows agencies and events to have a basic workspace for collaboration. Second, it provides a Jabber chat system, with user managed rooms. Third, it provides the Common Operational Picture, a custom executive situational awareness web application based on Oracle HTML DB. [4]
The Department of Homeland Security has publicly announced that the network has so far been hacked at least twice in 2009—once in March and once in April. [5]
Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
Interoperability is a characteristic of a product or system to work with other products or systems. While the term was initially defined for information technology or systems engineering services to allow for information exchange, a broader definition takes into account social, political, and organizational factors that impact system-to-system performance.
The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cyber security, and disaster prevention and management.
Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.
The Financial Crimes Enforcement Network (FinCEN) is a bureau of the United States Department of the Treasury that collects and analyzes information about financial transactions in order to combat domestic and international money laundering, terrorist financing, and other financial crimes.
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.
InfraGard is a national non-profit organization serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation. The organization is an information sharing and analysis effort serving the interests, and combining the knowledge base of, a wide range of private sector and government members. InfraGard is an association of individuals that facilitates information sharing and intelligence between businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to preventing hostile acts against the United States.
The Federal Protective Service (FPS) is a federal law enforcement agency of the United States Department of Homeland Security (DHS). It is also "the federal agency charged with protecting and delivering integrated law enforcement and security services to facilities owned or leased by the General Services Administration (GSA)"—over 9,000 buildings—and their occupants.
In the United States, fusion centers are designed to promote information sharing at the federal level between agencies such as the Federal Bureau of Investigation, the U.S. Department of Homeland Security, the U.S. Department of Justice, and state, local, and tribal law enforcement. As of February 2018, the U.S. Department of Homeland Security recognized 79 fusion centers. Fusion centers may also be affiliated with an emergency operations center that responds in the event of a disaster.
Intellipedia is an online system for collaborative data sharing used by the United States Intelligence Community (IC). It was established as a pilot project in late 2005 and formally announced in April 2006. Intellipedia consists of three wikis running on the separate JWICS (Intellipedia-TS), SIPRNet (Intellipedia-S), and DNI-U (Intellipedia-U) networks. The levels of classification allowed for information on the three wikis are Top Secret Sensitive Compartmented Information, Secret (S), and Sensitive But Unclassified information, respectively. Each of the wikis is used by individuals with appropriate clearances from the 18 agencies of the US intelligence community and other national-security related organizations, including Combatant Commands and other federal departments. The wikis are not open to the public.
The Joint Regional Information Exchange System (JRIES) began in December 2002 as an all-source intelligence / information sharing system, designed initially as a grassroots pilot system to connect the California Anti-Terrorism Information Center, the New York Police Department, and the Defense Intelligence Agency (DIA).
The EINSTEIN System is a network intrusion detection and prevention system that monitors the networks of US federal government departments and agencies. The system is developed and managed by the Cybersecurity and Infrastructure Security Agency in the United States Department of Homeland Security (DHS).
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less secure elements in the supply chain. A supply chain attack can occur in any industry, from the financial sector, oil industry, to a government sector. A supply chain attack can happen in software or hardware. Cybercriminals typically tamper with the manufacturing or distribution of a product by installing malware or hardware-based spying components. Symantec's 2019 Internet Security Threat Report states that supply chain attacks increased by 78 percent in 2018.
The National Criminal Intelligence Sharing Plan (NCISP) is an intelligence-sharing initiative that links the computer databases of local, state, regional, tribal law enforcement agencies with those of the U.S. federal government.
Virtual USA (vUSA), is a joint federal and state collaboration on a project that would allow state and local on-line tools and technologies, such as caches of geospatial data, to be interoperable and more useful with the goal of creating a "Virtual USA" for emergency response purposes. The initiative was developed by the DHS Directorate for Science and Technology (S&T), and currently operates as a pilot in eight states — Alabama, Georgia, Florida, Louisiana, Mississippi, Texas, Virginia and Tennessee — with plans to incorporate additional states.
Homeland Security Grant Program (HSGP) is a program in the United States established in 2003 and was designated to incorporate all projects that provide funding to local, state, and Federal government agencies by the Department of Homeland Security. The purpose of the grants is to purchase surveillance equipment, weapons, and advanced training for law enforcement personnel in order to heighten security. The HSGP helps fulfill one of the core missions of the Department of Homeland Security by enhancing the country's ability to prepare for, prevent, respond to and recover from potential attacks and other hazards. The HSGP is one of the main mechanisms in funding the creation and maintenance of national preparedness, which refers to the establishment of plans, procedures, policies, training, and equipment at the Federal, State, and local level that is needed to maximize the ability to prevent, respond to, and recover from major events such as terrorist attacks, major disasters, and other emergencies. The HSGP's creation stemmed from the consolidation of six original projects that were previously funded by the Office of State and Local Government Coordination and Preparedness. The HSGP now encompasses five projects in the program: State Homeland Security Program, Urban Areas Security Initiative, Operation Stonegarden, Metropolitan Medical Response System Program, and Citizen Corps Program. During the 2010 fiscal year, the Department of Homeland Security will spend $1,786,359,956 on the Homeland Security Grant Program.
The Information Sharing Environment (ISE) was established by the United States Intelligence Reform and Terrorism Prevention Act of 2004. Under Section 1016 of IRTPA, the Program Manager for the Information Sharing Environment (PM-ISE) was granted government wide authority to plan for, oversee the implementation of, and manage the ISE.
Intelligence sharing is "the ability to exchange intelligence, information, data, or knowledge among Federal, state, local or private-sector entities as appropriate." Intelligence sharing also involves intergovernmental bilateral or multilateral agreements and through international organizations. Intelligence sharing is meant to facilitate the use of actionable intelligence to a broader range of decision-makers.
Election cybersecurity or election security refers to the protection of elections and voting infrastructure from cyberattack or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases.
In 2020, a major cyberattack suspected to have been committed by a group backed by the Russian government penetrated thousands of organizations globally including multiple parts of the United States federal government, leading to a series of data breaches. The cyberattack and data breach were reported to be among the worst cyber-espionage incidents ever suffered by the U.S., due to the sensitivity and high profile of the targets and the long duration in which the hackers had access. Within days of its discovery, at least 200 organizations around the world had been reported to be affected by the attack, and some of these may also have suffered data breaches. Affected organizations worldwide included NATO, the U.K. government, the European Parliament, Microsoft and others.