homeland security information sharing architecture · agenda wobjectives wapproach warchitecture...
Post on 12-May-2019
214 Views
Preview:
TRANSCRIPT
1UNCLASSIFIED
UNCLASSIFIED
Homeland SecurityInformation Sharing
Architecture
National Defense Industrial AssociationInteroperability and Systems
Integration Conference2 April 2003
William F. DawsonDeputy Intelligence Community
Chief Information Officer
2
UNCLASSIFIED
UNCLASSIFIED
Agendaw Objectivesw Approachw Architecturew Information Sharingw Summary
3
UNCLASSIFIED
UNCLASSIFIED
Objectivesw Use existing capabilities and infrastructures
to support the analytical and informationdissemination needs of Homeland Securityw Provide actionable access to informationw Provide a roadmap for future system
development which ensures interoperabilityacross the Federal Government and beyond
4
UNCLASSIFIED
UNCLASSIFIED
Approachw Interconnect a Homeland Security
Community of Interest (COI) at each securitylevel:
Ø Top Secret SCIØ Secret CollateralØ Sensitive but Unclassified (SBU)
w Establish a governance process at eachsecurity level:
Ø PoliciesØ Standards
5
UNCLASSIFIED
UNCLASSIFIED
Intelligence Community System forInformation Sharing (ICSIS)w Provides the enterprise capabilities to store,
manage and disseminate HS information using:n Joint Worldwide Intelligence Communications System
(JWICS) for Top Secret connectivityn Secret Internet Protocol Routed Network (SIPRNET)
for Secret connectivityn Open Source Information System (OSIS) for
Unclassified/SBU connectivity
IC Enterprise Architecture
6
UNCLASSIFIED
UNCLASSIFIED
Intelligence Community System forInformation Sharing (ICSIS)w Provides the controlled interfaces to securely
transfer HS data to analysts at lower securitylevelsw Provides a governance structure for sensitive
compartmented information
IC Enterprise Architecture
7
UNCLASSIFIED
UNCLASSIFIED
Homeland Security Architecture
CollateralSpace
CRL
IC PKI
CommonServices
CA
SCICommunity
Space
PKI
HS SensitiveSpace
HSCOI
ICAgencies
CollateralSpace
IC PKI providesIdentification and authentication for HS COI users.
DoD PKI providesIdentification and authentication for HS COI users.
HS
HSCOI
Controlled InterfaceEnables transfer ofData from CollateralTo HS Sensitive
ControlledInterface
Controlled InterfaceEnables transfer ofData from SCITo Collateral
ControlledInterface
Intelink-S
HSShared
Data
Servers/Apps
Collaboration
SCI COI
HSShared
Data
Servers/Apps
Collaboration
SECRET COI
HSShared
Data
Servers/Apps
Collaboration
Unclass COI
SCI Network (JWICS) Collateral Network (SIPRNET) Unclassified Network (OSIS)
PKI
Commercial PKI providesIdentification and authentication for HS COI users.
CRLCRL
IC PKIIC PKI
CommonServices
CA
SCICommunity
Space
HSCOI
PKI
CollateralSpace
CRLCRL
IC PKIIC PKI
CommonServices
CA
SCICommunity
Space
PKIPKI
HS SensitiveSpace
HSCOI
ICAgencies
CollateralSpace
IC PKI providesIdentification and authentication for HS COI users.
DoD PKI providesIdentification and authentication for HS COI users.
HS
HSCOI
Controlled InterfaceEnables transfer ofData from CollateralTo HS Sensitive
ControlledInterface
Controlled InterfaceEnables transfer ofData from SCITo Collateral
ControlledInterface
Intelink-S
HSShared
Data
Servers/Apps
Collaboration
SCI COI
HSShared
Data
Servers/Apps
Collaboration
SECRET COI
HSShared
Data
Servers/Apps
Collaboration
Unclass COI
SCI Network (JWICS) Collateral Network (SIPRNET) Unclassified Network (OSIS)
PKI
Commercial PKI providesIdentification and authentication for HS COI users.
CRLCRL
IC PKIIC PKI
CommonServices
CA
SCICommunity
Space
HSCOI
PKI
8
UNCLASSIFIED
UNCLASSIFIED
TS/SCI Infrastructurew Managed by the Intelligence Community
n Takes full advantage of the existing ICSIS andComms infrastructure
n CT-Link provides an existing operational SecureCommunity of Interest:w Profiled cable/message reports/trafficw Community products (Warnings, Assessments)w Community databases
n Examples: State, FBI, CIA, etc.w E-Mailw Tailored Forums (bulletin boards)
Sharing SensitiveCompartmented Information
9
UNCLASSIFIED
UNCLASSIFIED
Collateral Infrastructurew Managed by Defense Department (and
others)n Takes full advantage of the DoD’s existing Secret
infrastructuren Takes full advantage of Secret version of Intelinkn Communities of Interest for Homeland Security
can be establishedn One department (e.g., Defense) could lead a
governance activity
Sharing CollateralInformation
10
UNCLASSIFIED
UNCLASSIFIED
Sensitive but UnclassifiedInfrastructurew Managed by Department of Homeland
Security (and others)n Takes full advantage of the existing Federal
Government infrastructure, includingw DOJ/FBI’s Law Enforcement Networksw DoD’s Unclassified Networksw State’s SBU Networksw IC’s Unclassified Networks
n Communities of Interest for Homeland Securitycan be established
n One Department (e.g., DHS) could lead agovernance activity
SharingUnclassified Information
11
UNCLASSIFIED
UNCLASSIFIED
Homeland SecurityInformation Sharing
Business Rules
Business Rules
Sources and MethodsSensitive Data
Actionable Data
Classified InformationActionable Data
Actionable Data
Existing Capabilities
TOP S
ECRE
T
SECR
ET
UNCL
ASS
/SBU
Information Flow
Emerging Capabilities
Controlled Interface
Controlled Interface
Unc
lass
ified
Rep
ortin
g an
d Fe
edba
ck
Participants
LE andDomesticAgencies
IC Analysts
DoD
Operators
Data
Military andotherSecretLevel
ForeignIntelligence
LawEnforcement
andDomestic
Governance
IC
DHS +
DoD +
12
UNCLASSIFIED
UNCLASSIFIED
Summaryw Existing operational capabilities and IT
infrastructures can and are being leveragedto support the analytical and informationdissemination needs of DHSw Actionable information and connectivity is
required at three distinct security levelsw Coordinated governance processes will
facilitate timely exchange of HomelandSecurity information
top related