View
229
Download
0
Category
Tags:
Preview:
Citation preview
1
ConstellationAutomated Critical Asset Management System (CACAMS)
2
ACAMS ndash Establishing the Universe
ACAMS a new tool for the new frontier This is the continuing roll-out of CACAMS Its indefinite mission to explore new methods to seek out new partners and define new and existing infrastructure to boldly go where the federal and many state and local governments have not gone before
3
Discussion Points
CACAMS Overview
Stakeholders
Capabilities
Concept of Operations
Tools and Resources
Users
4
Constellation Automated Critical Asset Management System (CACAMS) CACAMS is a secure Web-based information services portal used to
support infrastructure protection efforts at the state and local level- Provides access to a comprehensive set of tools and resources to develop and
implement comprehensive critical infrastructure programs
- Allows users to manage the collection and effective use of asset data
- Focuses on pre-incident prevention and protection but also assists in post-incident response
- Designed principally as a vulnerability assessment tool
DHS derives programmatic authority to build and manage CACAMS from- Homeland Security Act of 2002
- Homeland Security Presidential Direction (HSPD) ndash 7 Critical Infrastructure Identification Prioritization and Protection
- HSPD ndash 8 National Preparedness
- National Infrastructure Protection Plan (NIPP)
CACAMS incorporates national-level guidance to ensure consistency among state and local partners
5
State and Local First Responders Emergency Managers and Homeland Security Officials
DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)
Los Angeles Police Department (LAPD) Operation Archangel
DHS Protected Critical Infrastructure Information (PCII) Program Office
DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)
CACAMS Principal Stakeholders
6
Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors
bullNational Monuments amp Icons
bullEmergency Services
bullGovernment Facilities
bullHealthcare amp Public Health
bullCommercial Assets
bullDefense Industrial Base
bullInformation Technology
bullPostal amp Shipping
bullTelecommunications
bullDams
bullNuclear Power
bullWater Supply and Delivery
bullAgriculture amp Food
bullEnergy (other than nuclear)
bullChemical Hazardous Materials
bullBanking and Finance
bullTransportation
bull Manufacturing
7
SSA EMO
Protective Security
Coordination Division (PSCD)
Resource Management and
Planning
Contingency Planning amp
Incident Management
Division (CPIMD)
Partnership amp Outreach
Division (POD)
HITRAC
Chemical Security
Compliance Division (CSCD)
Infrastructure Information Collection Division
(IICD)
Infrastructure Analysis amp
Strategy Divison(IASD)
Contingency Planning amp
Incident Management
Division (CPIMD)
AdministrationChief of Staff-------------------
Dep Chief of Staff
External and International
Affairs
Assistant Secretary for Infrastructure Protection
----------------------------------------------------------------Dep Assistant Secretary for Infrastructure
Protection
DHS Office of Infrastructure Protection
8
DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by
the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government
Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under
- Freedom of Information Act (FOIA) requests
- State and local sunshine laws
- Civil litigation proceedings
CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act
9
CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs
are consistent with the NIPP and other federal-level plans programs and policies
- Built around the NIPP DHS Risk Management Framework
- Incorporates existing Infrastructure taxonomy
CACAMS integrates existing emerging DHS methodologies and reporting requirements
- Build DHS-level data models to ensure consistency across IT systems
- Push to build implement national vulnerability and risk assessment methodologies
- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo
- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
2
ACAMS ndash Establishing the Universe
ACAMS a new tool for the new frontier This is the continuing roll-out of CACAMS Its indefinite mission to explore new methods to seek out new partners and define new and existing infrastructure to boldly go where the federal and many state and local governments have not gone before
3
Discussion Points
CACAMS Overview
Stakeholders
Capabilities
Concept of Operations
Tools and Resources
Users
4
Constellation Automated Critical Asset Management System (CACAMS) CACAMS is a secure Web-based information services portal used to
support infrastructure protection efforts at the state and local level- Provides access to a comprehensive set of tools and resources to develop and
implement comprehensive critical infrastructure programs
- Allows users to manage the collection and effective use of asset data
- Focuses on pre-incident prevention and protection but also assists in post-incident response
- Designed principally as a vulnerability assessment tool
DHS derives programmatic authority to build and manage CACAMS from- Homeland Security Act of 2002
- Homeland Security Presidential Direction (HSPD) ndash 7 Critical Infrastructure Identification Prioritization and Protection
- HSPD ndash 8 National Preparedness
- National Infrastructure Protection Plan (NIPP)
CACAMS incorporates national-level guidance to ensure consistency among state and local partners
5
State and Local First Responders Emergency Managers and Homeland Security Officials
DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)
Los Angeles Police Department (LAPD) Operation Archangel
DHS Protected Critical Infrastructure Information (PCII) Program Office
DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)
CACAMS Principal Stakeholders
6
Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors
bullNational Monuments amp Icons
bullEmergency Services
bullGovernment Facilities
bullHealthcare amp Public Health
bullCommercial Assets
bullDefense Industrial Base
bullInformation Technology
bullPostal amp Shipping
bullTelecommunications
bullDams
bullNuclear Power
bullWater Supply and Delivery
bullAgriculture amp Food
bullEnergy (other than nuclear)
bullChemical Hazardous Materials
bullBanking and Finance
bullTransportation
bull Manufacturing
7
SSA EMO
Protective Security
Coordination Division (PSCD)
Resource Management and
Planning
Contingency Planning amp
Incident Management
Division (CPIMD)
Partnership amp Outreach
Division (POD)
HITRAC
Chemical Security
Compliance Division (CSCD)
Infrastructure Information Collection Division
(IICD)
Infrastructure Analysis amp
Strategy Divison(IASD)
Contingency Planning amp
Incident Management
Division (CPIMD)
AdministrationChief of Staff-------------------
Dep Chief of Staff
External and International
Affairs
Assistant Secretary for Infrastructure Protection
----------------------------------------------------------------Dep Assistant Secretary for Infrastructure
Protection
DHS Office of Infrastructure Protection
8
DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by
the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government
Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under
- Freedom of Information Act (FOIA) requests
- State and local sunshine laws
- Civil litigation proceedings
CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act
9
CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs
are consistent with the NIPP and other federal-level plans programs and policies
- Built around the NIPP DHS Risk Management Framework
- Incorporates existing Infrastructure taxonomy
CACAMS integrates existing emerging DHS methodologies and reporting requirements
- Build DHS-level data models to ensure consistency across IT systems
- Push to build implement national vulnerability and risk assessment methodologies
- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo
- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
3
Discussion Points
CACAMS Overview
Stakeholders
Capabilities
Concept of Operations
Tools and Resources
Users
4
Constellation Automated Critical Asset Management System (CACAMS) CACAMS is a secure Web-based information services portal used to
support infrastructure protection efforts at the state and local level- Provides access to a comprehensive set of tools and resources to develop and
implement comprehensive critical infrastructure programs
- Allows users to manage the collection and effective use of asset data
- Focuses on pre-incident prevention and protection but also assists in post-incident response
- Designed principally as a vulnerability assessment tool
DHS derives programmatic authority to build and manage CACAMS from- Homeland Security Act of 2002
- Homeland Security Presidential Direction (HSPD) ndash 7 Critical Infrastructure Identification Prioritization and Protection
- HSPD ndash 8 National Preparedness
- National Infrastructure Protection Plan (NIPP)
CACAMS incorporates national-level guidance to ensure consistency among state and local partners
5
State and Local First Responders Emergency Managers and Homeland Security Officials
DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)
Los Angeles Police Department (LAPD) Operation Archangel
DHS Protected Critical Infrastructure Information (PCII) Program Office
DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)
CACAMS Principal Stakeholders
6
Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors
bullNational Monuments amp Icons
bullEmergency Services
bullGovernment Facilities
bullHealthcare amp Public Health
bullCommercial Assets
bullDefense Industrial Base
bullInformation Technology
bullPostal amp Shipping
bullTelecommunications
bullDams
bullNuclear Power
bullWater Supply and Delivery
bullAgriculture amp Food
bullEnergy (other than nuclear)
bullChemical Hazardous Materials
bullBanking and Finance
bullTransportation
bull Manufacturing
7
SSA EMO
Protective Security
Coordination Division (PSCD)
Resource Management and
Planning
Contingency Planning amp
Incident Management
Division (CPIMD)
Partnership amp Outreach
Division (POD)
HITRAC
Chemical Security
Compliance Division (CSCD)
Infrastructure Information Collection Division
(IICD)
Infrastructure Analysis amp
Strategy Divison(IASD)
Contingency Planning amp
Incident Management
Division (CPIMD)
AdministrationChief of Staff-------------------
Dep Chief of Staff
External and International
Affairs
Assistant Secretary for Infrastructure Protection
----------------------------------------------------------------Dep Assistant Secretary for Infrastructure
Protection
DHS Office of Infrastructure Protection
8
DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by
the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government
Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under
- Freedom of Information Act (FOIA) requests
- State and local sunshine laws
- Civil litigation proceedings
CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act
9
CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs
are consistent with the NIPP and other federal-level plans programs and policies
- Built around the NIPP DHS Risk Management Framework
- Incorporates existing Infrastructure taxonomy
CACAMS integrates existing emerging DHS methodologies and reporting requirements
- Build DHS-level data models to ensure consistency across IT systems
- Push to build implement national vulnerability and risk assessment methodologies
- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo
- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
4
Constellation Automated Critical Asset Management System (CACAMS) CACAMS is a secure Web-based information services portal used to
support infrastructure protection efforts at the state and local level- Provides access to a comprehensive set of tools and resources to develop and
implement comprehensive critical infrastructure programs
- Allows users to manage the collection and effective use of asset data
- Focuses on pre-incident prevention and protection but also assists in post-incident response
- Designed principally as a vulnerability assessment tool
DHS derives programmatic authority to build and manage CACAMS from- Homeland Security Act of 2002
- Homeland Security Presidential Direction (HSPD) ndash 7 Critical Infrastructure Identification Prioritization and Protection
- HSPD ndash 8 National Preparedness
- National Infrastructure Protection Plan (NIPP)
CACAMS incorporates national-level guidance to ensure consistency among state and local partners
5
State and Local First Responders Emergency Managers and Homeland Security Officials
DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)
Los Angeles Police Department (LAPD) Operation Archangel
DHS Protected Critical Infrastructure Information (PCII) Program Office
DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)
CACAMS Principal Stakeholders
6
Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors
bullNational Monuments amp Icons
bullEmergency Services
bullGovernment Facilities
bullHealthcare amp Public Health
bullCommercial Assets
bullDefense Industrial Base
bullInformation Technology
bullPostal amp Shipping
bullTelecommunications
bullDams
bullNuclear Power
bullWater Supply and Delivery
bullAgriculture amp Food
bullEnergy (other than nuclear)
bullChemical Hazardous Materials
bullBanking and Finance
bullTransportation
bull Manufacturing
7
SSA EMO
Protective Security
Coordination Division (PSCD)
Resource Management and
Planning
Contingency Planning amp
Incident Management
Division (CPIMD)
Partnership amp Outreach
Division (POD)
HITRAC
Chemical Security
Compliance Division (CSCD)
Infrastructure Information Collection Division
(IICD)
Infrastructure Analysis amp
Strategy Divison(IASD)
Contingency Planning amp
Incident Management
Division (CPIMD)
AdministrationChief of Staff-------------------
Dep Chief of Staff
External and International
Affairs
Assistant Secretary for Infrastructure Protection
----------------------------------------------------------------Dep Assistant Secretary for Infrastructure
Protection
DHS Office of Infrastructure Protection
8
DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by
the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government
Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under
- Freedom of Information Act (FOIA) requests
- State and local sunshine laws
- Civil litigation proceedings
CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act
9
CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs
are consistent with the NIPP and other federal-level plans programs and policies
- Built around the NIPP DHS Risk Management Framework
- Incorporates existing Infrastructure taxonomy
CACAMS integrates existing emerging DHS methodologies and reporting requirements
- Build DHS-level data models to ensure consistency across IT systems
- Push to build implement national vulnerability and risk assessment methodologies
- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo
- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
5
State and Local First Responders Emergency Managers and Homeland Security Officials
DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)
Los Angeles Police Department (LAPD) Operation Archangel
DHS Protected Critical Infrastructure Information (PCII) Program Office
DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)
CACAMS Principal Stakeholders
6
Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors
bullNational Monuments amp Icons
bullEmergency Services
bullGovernment Facilities
bullHealthcare amp Public Health
bullCommercial Assets
bullDefense Industrial Base
bullInformation Technology
bullPostal amp Shipping
bullTelecommunications
bullDams
bullNuclear Power
bullWater Supply and Delivery
bullAgriculture amp Food
bullEnergy (other than nuclear)
bullChemical Hazardous Materials
bullBanking and Finance
bullTransportation
bull Manufacturing
7
SSA EMO
Protective Security
Coordination Division (PSCD)
Resource Management and
Planning
Contingency Planning amp
Incident Management
Division (CPIMD)
Partnership amp Outreach
Division (POD)
HITRAC
Chemical Security
Compliance Division (CSCD)
Infrastructure Information Collection Division
(IICD)
Infrastructure Analysis amp
Strategy Divison(IASD)
Contingency Planning amp
Incident Management
Division (CPIMD)
AdministrationChief of Staff-------------------
Dep Chief of Staff
External and International
Affairs
Assistant Secretary for Infrastructure Protection
----------------------------------------------------------------Dep Assistant Secretary for Infrastructure
Protection
DHS Office of Infrastructure Protection
8
DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by
the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government
Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under
- Freedom of Information Act (FOIA) requests
- State and local sunshine laws
- Civil litigation proceedings
CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act
9
CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs
are consistent with the NIPP and other federal-level plans programs and policies
- Built around the NIPP DHS Risk Management Framework
- Incorporates existing Infrastructure taxonomy
CACAMS integrates existing emerging DHS methodologies and reporting requirements
- Build DHS-level data models to ensure consistency across IT systems
- Push to build implement national vulnerability and risk assessment methodologies
- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo
- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
6
Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors
bullNational Monuments amp Icons
bullEmergency Services
bullGovernment Facilities
bullHealthcare amp Public Health
bullCommercial Assets
bullDefense Industrial Base
bullInformation Technology
bullPostal amp Shipping
bullTelecommunications
bullDams
bullNuclear Power
bullWater Supply and Delivery
bullAgriculture amp Food
bullEnergy (other than nuclear)
bullChemical Hazardous Materials
bullBanking and Finance
bullTransportation
bull Manufacturing
7
SSA EMO
Protective Security
Coordination Division (PSCD)
Resource Management and
Planning
Contingency Planning amp
Incident Management
Division (CPIMD)
Partnership amp Outreach
Division (POD)
HITRAC
Chemical Security
Compliance Division (CSCD)
Infrastructure Information Collection Division
(IICD)
Infrastructure Analysis amp
Strategy Divison(IASD)
Contingency Planning amp
Incident Management
Division (CPIMD)
AdministrationChief of Staff-------------------
Dep Chief of Staff
External and International
Affairs
Assistant Secretary for Infrastructure Protection
----------------------------------------------------------------Dep Assistant Secretary for Infrastructure
Protection
DHS Office of Infrastructure Protection
8
DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by
the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government
Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under
- Freedom of Information Act (FOIA) requests
- State and local sunshine laws
- Civil litigation proceedings
CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act
9
CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs
are consistent with the NIPP and other federal-level plans programs and policies
- Built around the NIPP DHS Risk Management Framework
- Incorporates existing Infrastructure taxonomy
CACAMS integrates existing emerging DHS methodologies and reporting requirements
- Build DHS-level data models to ensure consistency across IT systems
- Push to build implement national vulnerability and risk assessment methodologies
- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo
- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
7
SSA EMO
Protective Security
Coordination Division (PSCD)
Resource Management and
Planning
Contingency Planning amp
Incident Management
Division (CPIMD)
Partnership amp Outreach
Division (POD)
HITRAC
Chemical Security
Compliance Division (CSCD)
Infrastructure Information Collection Division
(IICD)
Infrastructure Analysis amp
Strategy Divison(IASD)
Contingency Planning amp
Incident Management
Division (CPIMD)
AdministrationChief of Staff-------------------
Dep Chief of Staff
External and International
Affairs
Assistant Secretary for Infrastructure Protection
----------------------------------------------------------------Dep Assistant Secretary for Infrastructure
Protection
DHS Office of Infrastructure Protection
8
DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by
the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government
Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under
- Freedom of Information Act (FOIA) requests
- State and local sunshine laws
- Civil litigation proceedings
CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act
9
CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs
are consistent with the NIPP and other federal-level plans programs and policies
- Built around the NIPP DHS Risk Management Framework
- Incorporates existing Infrastructure taxonomy
CACAMS integrates existing emerging DHS methodologies and reporting requirements
- Build DHS-level data models to ensure consistency across IT systems
- Push to build implement national vulnerability and risk assessment methodologies
- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo
- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
8
DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by
the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government
Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under
- Freedom of Information Act (FOIA) requests
- State and local sunshine laws
- Civil litigation proceedings
CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act
9
CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs
are consistent with the NIPP and other federal-level plans programs and policies
- Built around the NIPP DHS Risk Management Framework
- Incorporates existing Infrastructure taxonomy
CACAMS integrates existing emerging DHS methodologies and reporting requirements
- Build DHS-level data models to ensure consistency across IT systems
- Push to build implement national vulnerability and risk assessment methodologies
- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo
- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
9
CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs
are consistent with the NIPP and other federal-level plans programs and policies
- Built around the NIPP DHS Risk Management Framework
- Incorporates existing Infrastructure taxonomy
CACAMS integrates existing emerging DHS methodologies and reporting requirements
- Build DHS-level data models to ensure consistency across IT systems
- Push to build implement national vulnerability and risk assessment methodologies
- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo
- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
10
CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first
responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS
- CACAMS success depends on PublicPrivate Partnerships (P3)
Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning
- Supports both EOCs and an Incident Commander during a major response effort
- Incorporates private sector equities through close regular coordination and cooperation
Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation
- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area
- CACAMS enables the effective inventory and management of thousands of assets within these areas
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
11
CACAMS Tools and Resources
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
12
CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and
information needs of first responders
Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality
An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment
A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets
Generate Buffer Zone Protection Plans (BZPPs)
Generate pre-incident operational plans for local police and first responders
Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs
Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
13
Inventory Why Inventory
PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed
PLANNING You cannot protect every potential target
1048707How many targets
1048707How do you prioritize resources
RESPONSE The incident commander needs vital information on the target in a timely manner
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
14
PCII - CACAMS National Deployment Status
26 StatesTerritories Approved for PCII but no CACAMS data
09 StatesTerritories Not Approved for PCII Access
20 StatesTerritories with data loaded on CACAMS
1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08
69
779
29
26
37
44
89
50
85
2846
116
6
29
1172
31
4
9
MA (113)
RI (1)
DE (4)
MD (14)
DC (58)
3
4
9
4
1
6210
11
7
3
39
2
13
4
NJ (2)
GU (2)PR (2)
USVI
AS
MP
HI (3)
3
1
- The number in each state represents total trained CACAMS users in the state
CT (10)
1
1
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
15
USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy
with the Ohio Homeland Security Office heading State efforts
Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo
Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions
Ohio Homeland Security Office
State Fusion Center
Protective Security Planners
UASITEWGs
CincinnatiClevelandColumbus
Toledo
CountyEmergency
Management Directors
Local Law Enforcement
Fire Officials
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
16
12
34
5
67
8
Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
17
Summary CACAMS is a tool that can be viewed
and used at multiple levels of government to support a common operational picture during an incident or for planning
Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence
CACAMS builds Public-Private Partnerships
The Asset Manager Questionnaire provides the most reliable and current information for a specific asset
Recommended