Additional Resources

Additional Resources

What is the Standards Coordinating Council?

The Standards Coordinating Council (SCC), co-chaired by PM-ISE Kshemendra Paul, is an advisory group composed of industry consortium and standards development organizations that provides advice and counsel on matters related to information sharing standards and other issues related to responsible information sharing.

 

Who is on the SCC?

The SCC is an advisory group composed of industry consortium and standards development organizations, including but not limited to the Object Management Group, IJIS, Association for Enterprise Integration, Open Geospacial Consortium, American Council for Technology – Industry Advisory Council, OASIS, Global Justice Information Sharing Initiative, and the National Information Exchange Model Program Management Office. This list may continue to grow as necessary.

 

What are the goals of the SCC?

In addition to providing advice and counsel, we hope the SCC will help us advance responsible information sharing and information sharing standards. More specifically, some of their work includes helping to:

  • Identify high-priority standards activities that can be coordinated across standards development organizations (SDOs) for greater return on resources
  • Communicate stakeholder requirements to identify opportunities to develop or integrate technical and functional roadmaps
  • Coordinate governance processes across SDOs to streamline standards development activities and to enhance communication, collaboration, and consensus between standards partners
  • Coordinate outreach and training opportunities to reach a broader constituency
  • Coordinate private sector standards activities with federal governance bodies such as the Federal CIO Council

 

How can I get involved?

If you are interested in helping us promote and advance information sharing standards, we welcome your support. We recommend that you:

  • Engage the industry groups listed above.
  • Attend a Workshop on Information Sharing and Safeguarding (WIS3) event.
  • Subscribe to our Standards & Interoperability email list. As important information sharing standards issues and events arise, and as this effort evolves, we will communicate updates via that email list.
  • Learn more about information sharing standards by browsing content on ISE.gov tagged with technical standards.

Previous efforts to quantitatively track performance across the ISE have been fraught with difficulty given the size, scope, and diversity of various programs and initiatives undertaken by ISE mission partners. PM-ISE uses mission stories to track ISE mission progress and causal program outcomes across the breadth of ISE work. Within this framework and in lieu of previous quantitative metrics reporting, PM-ISE also uses the Government Accountability Office’s (GAO) High Risk List objectives and NSISS SIP milestones to show incremental success toward ISE objectives across the ISE community.

 

GAO High Risk List 2015 Objectives

 

The establishment of the ISE and the management of terrorism-related information sharing has been on GAO’s High Risk List since 2005. The High Risk List designates serious weakness areas that involve substantial resources and provide critical services to the public[1]. The timely, relevant, and useful dissemination of terrorism-related information represents a critical service to supporting national security. In 2015, the GAO wrote updated recommendations based on PM-ISE’s decade of work toward information sharing, and these recommendation can serve as additional qualitative metrics for implementation of ISE services and management. The GAO’s objectives for the ISE include:

 

  • Action planning: Implementing information interoperability across the ISE and execution of key architecture-related tasks described in the implementation plan
  • Monitoring: Developing metrics that measure actions accomplished and tangible results achieved within individual departments and agencies as well as across the ISE
  • Demonstrated progress: Demonstrating that established time frames and milestones are being used to track progress of the objectives in the implementation plan[2]

Strategic Implementation Plan (SIP) Milestones

 

The 2012 National Strategy for Information Sharing and Safeguarding (NSISS) calls for collaboration among federal, state, local, and tribal partners as well as the private sector and foreign partners to promote secure and responsible information sharing. The strategy focuses on five goals:

 

  • Drive collective action through collaboration and accountability
  • Improve information discovery and access through common standards
  • Optimize mission effectiveness through shared services and interoperability
  • Strengthen information safeguarding through structural reform, policy, and technical solutions
  • Protect privacy, civil rights, and civil liberties through consistency and compliance[3]

From this directive, PM-ISE has developed a Strategic Implementation Plan that breaks these five goals into priority objectives and milestones to complete the goals set forth in the NSISS. PM-ISE is on track to complete final priority objectives or transfer ownership to other ISE stewards by the end of FY16 and mission stories should reflect this upon closeout of the SIP when they are tied to PM-ISE or ISE projects and portfolios.

 


 

[1] High Risk Series: An Update. GAO-15-290. Washington, D.C.: Feb. 1, 2015. Page 4.

 

[2] Ibid Page 233

 

[3] National Strategy for Information Sharing and Safeguarding. Washington, D.C.: Dec 1, 2015. Page 1-2.

The Consolidated Terrorist Watchlist (CTW), enables America’s front line screening agencies to identify known or suspected terrorists when they attempt to enter the United States. This multi-agency mission is shared by the National Counterterrorism Center (NCTC), the Terrorist Screening Center (TSC) , and the Transportation Security Administration (TSA).

 

Cargo Screening

 

Over 250 million tons of cargo arrive in the United States yearly. U.S. Customs and Border Protection screens this cargo for materials that could potentially be used in a terrorist attack or other criminal activities, a mission which PM-ISE has supported by assisting to develop cross-governmental cargo security standards and architectures, built on existing systems, to enhance terrorism-related secure cargo information access, data distribution, and sharing.

 

Improved Person Screening

 

The science of biometrics is revolutionizing personal identification, authentication, and access control. Using face, finger, and iris recognition, biometrics makes the spelling and duplication errors inherent in name-based screening a thing of the past. To ensure common biometric standards and interoperability across all federal systems, PM-ISE supported an interagency effort lead by the National Science and Technology Council (NSTC) Subcommittee on Biometrics and Identity Management, to develop the NSTC Policy for Enabling the Development, Adoption and Use of Biometric Standards, and an associated Registry of U.S. Government Recommended Biometric Standards.

 

National Targeting Center‐Passenger (NTCP)

 

The National Targeting Center-Passenger (NTC-P) plays a vital role in the identification of persons who pose a threat to national security. Covering 327 U.S. ports of entry and over 30 Border Patrol checkpoints, the NTC-P uses cutting-edge automated enforcement data processing systems to prevent terrorists from gaining access to the United States.

 

CVE Task Forces

 

Following a White House Summit on CVE, the Department of Homeland Security (DHS) was tasked with standing up the CVE Task Force to be a permanent interagency task force hosted by the Overall leadership provided by DHS and the Department of Justice, with additional staffing provided by representatives from the Federal Bureau of Investigation, National Counterterrorism Center, and other supporting departments and agencies. The task force will be administratively housed at DHS. The CVE Task Force will address the gaps identified in the review by (1) synchronizing and integrating whole-of-government CVE programs and activities; (2) leveraging new CVE efforts, for example those of the DHS Office for Community Partnerships; (3) conducting ongoing strategic planning; and (4) assessing and evaluating CVE programs and activities. To read the full press release, click here.

 

Peer to Peer Initiatives

 

The Peer 2 Peer program is a public-private partnership designed to empower college students at home and abroad to create narratives on social media to challenge violent extremist recruitment.  The strategy behind the program is the simple, powerful notion that the best strategies for combatting violent extremism and radicalization on social media come from creative, thoughtful and committed young people who know how to reach their peers.  The program creates a platform where talented college students bring their best thinking and ideas to the table to combat a threat that affects all of us in the United States and around the world.

Identity, Credential, and Access Management (ICAM) is the set of security disciplines that establish trust and interoperability among organizations that want to share information. Organizations look for assurances that partners with whom they wish to share are implementing policies and standards in a manner worthy of trust and that support interoperability before information sharing can occur. The ICAM landscape includes information sharing at the Sensitive But Unclassified (SBU), Secret, and Top Secret levels of information access.

ICAM facilitates this information sharing through seven disciplines:

 

  • Identity Management
  • Credential Management
  • Access Management
  • Bring Your Own Identity
  • Authentication
  • Authorization
  • Federation

ICAM supports the National Strategy for Information Sharing and Safeguarding (NSISS) priority objective to engage in responsible, secure information sharing within and across classified and unclassified security domains. 

The Homeland Security Information Network (HSIN) is the trusted network for homeland security mission operations to share Sensitive But Unclassified information.

 

HSIN is the nation’s focal point for sharing Sensitive But Unclassified information. It enables Federal, State, local, tribal, territorial, international and private sector homeland security partners to achieve their missions through information sharing.

 

HSIN is a mature information sharing model, eliminating vertical silos and enabling greater market penetration through a cloud environment. Through HSIN, the information sharing requirements of homeland security mission operators are matched with appropriate access rights, enabling users to access content based on their verified attributes, and supported by the use of effective processes and strong governance.

HSIN's Features and Capabilities:

  • Alerts and Notifications Basic
  • Learning Management System (LMS)
  • Comprehensive HSIN Training Document Repository
  • GIS Mapping
  • Instant Messaging (HSIN Chat)
  • Managed Workflow Capabilities
  • Secure Messaging (HSINBox)
  • Web Conferencing (HSIN Connect)

FEATURES

HSIN Videos

Homeland Security Information Network users explain how the trusted network supports their homeland security mission operations to share sensitive but unclassified information.

ISE Training

Core Awareness Training provides an overview of the ISE and includes a significantly expanded discussion on privacy, civil rights, and civil liberties protections.

Privacy

ISE mission partners at all levels of government work to put safeguards in place to ensure the protection of privacy, civil rights, and civil liberties of citizens.