17
1 Constellation/Automated Critical Asset Management System (C/ACAMS)

1 Constellation/Automated Critical Asset Management System (C/ACAMS)

Embed Size (px)

Citation preview

Page 1: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

1

ConstellationAutomated Critical Asset Management System (CACAMS)

2

ACAMS ndash Establishing the Universe

ACAMS a new tool for the new frontier This is the continuing roll-out of CACAMS Its indefinite mission to explore new methods to seek out new partners and define new and existing infrastructure to boldly go where the federal and many state and local governments have not gone before

3

Discussion Points

CACAMS Overview

Stakeholders

Capabilities

Concept of Operations

Tools and Resources

Users

4

Constellation Automated Critical Asset Management System (CACAMS) CACAMS is a secure Web-based information services portal used to

support infrastructure protection efforts at the state and local level- Provides access to a comprehensive set of tools and resources to develop and

implement comprehensive critical infrastructure programs

- Allows users to manage the collection and effective use of asset data

- Focuses on pre-incident prevention and protection but also assists in post-incident response

- Designed principally as a vulnerability assessment tool

DHS derives programmatic authority to build and manage CACAMS from- Homeland Security Act of 2002

- Homeland Security Presidential Direction (HSPD) ndash 7 Critical Infrastructure Identification Prioritization and Protection

- HSPD ndash 8 National Preparedness

- National Infrastructure Protection Plan (NIPP)

CACAMS incorporates national-level guidance to ensure consistency among state and local partners

5

State and Local First Responders Emergency Managers and Homeland Security Officials

DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)

Los Angeles Police Department (LAPD) Operation Archangel

DHS Protected Critical Infrastructure Information (PCII) Program Office

DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)

CACAMS Principal Stakeholders

6

Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors

bullNational Monuments amp Icons

bullEmergency Services

bullGovernment Facilities

bullHealthcare amp Public Health

bullCommercial Assets

bullDefense Industrial Base

bullInformation Technology

bullPostal amp Shipping

bullTelecommunications

bullDams

bullNuclear Power

bullWater Supply and Delivery

bullAgriculture amp Food

bullEnergy (other than nuclear)

bullChemical Hazardous Materials

bullBanking and Finance

bullTransportation

bull Manufacturing

7

SSA EMO

Protective Security

Coordination Division (PSCD)

Resource Management and

Planning

Contingency Planning amp

Incident Management

Division (CPIMD)

Partnership amp Outreach

Division (POD)

HITRAC

Chemical Security

Compliance Division (CSCD)

Infrastructure Information Collection Division

(IICD)

Infrastructure Analysis amp

Strategy Divison(IASD)

Contingency Planning amp

Incident Management

Division (CPIMD)

AdministrationChief of Staff-------------------

Dep Chief of Staff

External and International

Affairs

Assistant Secretary for Infrastructure Protection

----------------------------------------------------------------Dep Assistant Secretary for Infrastructure

Protection

DHS Office of Infrastructure Protection

8

DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by

the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government

Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under

- Freedom of Information Act (FOIA) requests

- State and local sunshine laws

- Civil litigation proceedings

CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act

9

CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs

are consistent with the NIPP and other federal-level plans programs and policies

- Built around the NIPP DHS Risk Management Framework

- Incorporates existing Infrastructure taxonomy

CACAMS integrates existing emerging DHS methodologies and reporting requirements

- Build DHS-level data models to ensure consistency across IT systems

- Push to build implement national vulnerability and risk assessment methodologies

- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo

- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 2: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

2

ACAMS ndash Establishing the Universe

ACAMS a new tool for the new frontier This is the continuing roll-out of CACAMS Its indefinite mission to explore new methods to seek out new partners and define new and existing infrastructure to boldly go where the federal and many state and local governments have not gone before

3

Discussion Points

CACAMS Overview

Stakeholders

Capabilities

Concept of Operations

Tools and Resources

Users

4

Constellation Automated Critical Asset Management System (CACAMS) CACAMS is a secure Web-based information services portal used to

support infrastructure protection efforts at the state and local level- Provides access to a comprehensive set of tools and resources to develop and

implement comprehensive critical infrastructure programs

- Allows users to manage the collection and effective use of asset data

- Focuses on pre-incident prevention and protection but also assists in post-incident response

- Designed principally as a vulnerability assessment tool

DHS derives programmatic authority to build and manage CACAMS from- Homeland Security Act of 2002

- Homeland Security Presidential Direction (HSPD) ndash 7 Critical Infrastructure Identification Prioritization and Protection

- HSPD ndash 8 National Preparedness

- National Infrastructure Protection Plan (NIPP)

CACAMS incorporates national-level guidance to ensure consistency among state and local partners

5

State and Local First Responders Emergency Managers and Homeland Security Officials

DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)

Los Angeles Police Department (LAPD) Operation Archangel

DHS Protected Critical Infrastructure Information (PCII) Program Office

DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)

CACAMS Principal Stakeholders

6

Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors

bullNational Monuments amp Icons

bullEmergency Services

bullGovernment Facilities

bullHealthcare amp Public Health

bullCommercial Assets

bullDefense Industrial Base

bullInformation Technology

bullPostal amp Shipping

bullTelecommunications

bullDams

bullNuclear Power

bullWater Supply and Delivery

bullAgriculture amp Food

bullEnergy (other than nuclear)

bullChemical Hazardous Materials

bullBanking and Finance

bullTransportation

bull Manufacturing

7

SSA EMO

Protective Security

Coordination Division (PSCD)

Resource Management and

Planning

Contingency Planning amp

Incident Management

Division (CPIMD)

Partnership amp Outreach

Division (POD)

HITRAC

Chemical Security

Compliance Division (CSCD)

Infrastructure Information Collection Division

(IICD)

Infrastructure Analysis amp

Strategy Divison(IASD)

Contingency Planning amp

Incident Management

Division (CPIMD)

AdministrationChief of Staff-------------------

Dep Chief of Staff

External and International

Affairs

Assistant Secretary for Infrastructure Protection

----------------------------------------------------------------Dep Assistant Secretary for Infrastructure

Protection

DHS Office of Infrastructure Protection

8

DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by

the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government

Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under

- Freedom of Information Act (FOIA) requests

- State and local sunshine laws

- Civil litigation proceedings

CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act

9

CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs

are consistent with the NIPP and other federal-level plans programs and policies

- Built around the NIPP DHS Risk Management Framework

- Incorporates existing Infrastructure taxonomy

CACAMS integrates existing emerging DHS methodologies and reporting requirements

- Build DHS-level data models to ensure consistency across IT systems

- Push to build implement national vulnerability and risk assessment methodologies

- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo

- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 3: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

3

Discussion Points

CACAMS Overview

Stakeholders

Capabilities

Concept of Operations

Tools and Resources

Users

4

Constellation Automated Critical Asset Management System (CACAMS) CACAMS is a secure Web-based information services portal used to

support infrastructure protection efforts at the state and local level- Provides access to a comprehensive set of tools and resources to develop and

implement comprehensive critical infrastructure programs

- Allows users to manage the collection and effective use of asset data

- Focuses on pre-incident prevention and protection but also assists in post-incident response

- Designed principally as a vulnerability assessment tool

DHS derives programmatic authority to build and manage CACAMS from- Homeland Security Act of 2002

- Homeland Security Presidential Direction (HSPD) ndash 7 Critical Infrastructure Identification Prioritization and Protection

- HSPD ndash 8 National Preparedness

- National Infrastructure Protection Plan (NIPP)

CACAMS incorporates national-level guidance to ensure consistency among state and local partners

5

State and Local First Responders Emergency Managers and Homeland Security Officials

DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)

Los Angeles Police Department (LAPD) Operation Archangel

DHS Protected Critical Infrastructure Information (PCII) Program Office

DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)

CACAMS Principal Stakeholders

6

Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors

bullNational Monuments amp Icons

bullEmergency Services

bullGovernment Facilities

bullHealthcare amp Public Health

bullCommercial Assets

bullDefense Industrial Base

bullInformation Technology

bullPostal amp Shipping

bullTelecommunications

bullDams

bullNuclear Power

bullWater Supply and Delivery

bullAgriculture amp Food

bullEnergy (other than nuclear)

bullChemical Hazardous Materials

bullBanking and Finance

bullTransportation

bull Manufacturing

7

SSA EMO

Protective Security

Coordination Division (PSCD)

Resource Management and

Planning

Contingency Planning amp

Incident Management

Division (CPIMD)

Partnership amp Outreach

Division (POD)

HITRAC

Chemical Security

Compliance Division (CSCD)

Infrastructure Information Collection Division

(IICD)

Infrastructure Analysis amp

Strategy Divison(IASD)

Contingency Planning amp

Incident Management

Division (CPIMD)

AdministrationChief of Staff-------------------

Dep Chief of Staff

External and International

Affairs

Assistant Secretary for Infrastructure Protection

----------------------------------------------------------------Dep Assistant Secretary for Infrastructure

Protection

DHS Office of Infrastructure Protection

8

DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by

the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government

Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under

- Freedom of Information Act (FOIA) requests

- State and local sunshine laws

- Civil litigation proceedings

CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act

9

CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs

are consistent with the NIPP and other federal-level plans programs and policies

- Built around the NIPP DHS Risk Management Framework

- Incorporates existing Infrastructure taxonomy

CACAMS integrates existing emerging DHS methodologies and reporting requirements

- Build DHS-level data models to ensure consistency across IT systems

- Push to build implement national vulnerability and risk assessment methodologies

- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo

- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 4: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

4

Constellation Automated Critical Asset Management System (CACAMS) CACAMS is a secure Web-based information services portal used to

support infrastructure protection efforts at the state and local level- Provides access to a comprehensive set of tools and resources to develop and

implement comprehensive critical infrastructure programs

- Allows users to manage the collection and effective use of asset data

- Focuses on pre-incident prevention and protection but also assists in post-incident response

- Designed principally as a vulnerability assessment tool

DHS derives programmatic authority to build and manage CACAMS from- Homeland Security Act of 2002

- Homeland Security Presidential Direction (HSPD) ndash 7 Critical Infrastructure Identification Prioritization and Protection

- HSPD ndash 8 National Preparedness

- National Infrastructure Protection Plan (NIPP)

CACAMS incorporates national-level guidance to ensure consistency among state and local partners

5

State and Local First Responders Emergency Managers and Homeland Security Officials

DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)

Los Angeles Police Department (LAPD) Operation Archangel

DHS Protected Critical Infrastructure Information (PCII) Program Office

DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)

CACAMS Principal Stakeholders

6

Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors

bullNational Monuments amp Icons

bullEmergency Services

bullGovernment Facilities

bullHealthcare amp Public Health

bullCommercial Assets

bullDefense Industrial Base

bullInformation Technology

bullPostal amp Shipping

bullTelecommunications

bullDams

bullNuclear Power

bullWater Supply and Delivery

bullAgriculture amp Food

bullEnergy (other than nuclear)

bullChemical Hazardous Materials

bullBanking and Finance

bullTransportation

bull Manufacturing

7

SSA EMO

Protective Security

Coordination Division (PSCD)

Resource Management and

Planning

Contingency Planning amp

Incident Management

Division (CPIMD)

Partnership amp Outreach

Division (POD)

HITRAC

Chemical Security

Compliance Division (CSCD)

Infrastructure Information Collection Division

(IICD)

Infrastructure Analysis amp

Strategy Divison(IASD)

Contingency Planning amp

Incident Management

Division (CPIMD)

AdministrationChief of Staff-------------------

Dep Chief of Staff

External and International

Affairs

Assistant Secretary for Infrastructure Protection

----------------------------------------------------------------Dep Assistant Secretary for Infrastructure

Protection

DHS Office of Infrastructure Protection

8

DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by

the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government

Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under

- Freedom of Information Act (FOIA) requests

- State and local sunshine laws

- Civil litigation proceedings

CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act

9

CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs

are consistent with the NIPP and other federal-level plans programs and policies

- Built around the NIPP DHS Risk Management Framework

- Incorporates existing Infrastructure taxonomy

CACAMS integrates existing emerging DHS methodologies and reporting requirements

- Build DHS-level data models to ensure consistency across IT systems

- Push to build implement national vulnerability and risk assessment methodologies

- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo

- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 5: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

5

State and Local First Responders Emergency Managers and Homeland Security Officials

DHS Office on Infrastructure Protection Infrastructure Information Collection Division (IICD)

Los Angeles Police Department (LAPD) Operation Archangel

DHS Protected Critical Infrastructure Information (PCII) Program Office

DHS Federal Emergency Management Agency National Preparedness Directorate (FEMANPD)

CACAMS Principal Stakeholders

6

Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors

bullNational Monuments amp Icons

bullEmergency Services

bullGovernment Facilities

bullHealthcare amp Public Health

bullCommercial Assets

bullDefense Industrial Base

bullInformation Technology

bullPostal amp Shipping

bullTelecommunications

bullDams

bullNuclear Power

bullWater Supply and Delivery

bullAgriculture amp Food

bullEnergy (other than nuclear)

bullChemical Hazardous Materials

bullBanking and Finance

bullTransportation

bull Manufacturing

7

SSA EMO

Protective Security

Coordination Division (PSCD)

Resource Management and

Planning

Contingency Planning amp

Incident Management

Division (CPIMD)

Partnership amp Outreach

Division (POD)

HITRAC

Chemical Security

Compliance Division (CSCD)

Infrastructure Information Collection Division

(IICD)

Infrastructure Analysis amp

Strategy Divison(IASD)

Contingency Planning amp

Incident Management

Division (CPIMD)

AdministrationChief of Staff-------------------

Dep Chief of Staff

External and International

Affairs

Assistant Secretary for Infrastructure Protection

----------------------------------------------------------------Dep Assistant Secretary for Infrastructure

Protection

DHS Office of Infrastructure Protection

8

DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by

the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government

Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under

- Freedom of Information Act (FOIA) requests

- State and local sunshine laws

- Civil litigation proceedings

CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act

9

CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs

are consistent with the NIPP and other federal-level plans programs and policies

- Built around the NIPP DHS Risk Management Framework

- Incorporates existing Infrastructure taxonomy

CACAMS integrates existing emerging DHS methodologies and reporting requirements

- Build DHS-level data models to ensure consistency across IT systems

- Push to build implement national vulnerability and risk assessment methodologies

- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo

- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 6: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

6

Critical InfrastructureAssets in the Critical Infrastructure category include the systems places and people that are needed to provide continuity of operations in eighteen (18) potential sectors

bullNational Monuments amp Icons

bullEmergency Services

bullGovernment Facilities

bullHealthcare amp Public Health

bullCommercial Assets

bullDefense Industrial Base

bullInformation Technology

bullPostal amp Shipping

bullTelecommunications

bullDams

bullNuclear Power

bullWater Supply and Delivery

bullAgriculture amp Food

bullEnergy (other than nuclear)

bullChemical Hazardous Materials

bullBanking and Finance

bullTransportation

bull Manufacturing

7

SSA EMO

Protective Security

Coordination Division (PSCD)

Resource Management and

Planning

Contingency Planning amp

Incident Management

Division (CPIMD)

Partnership amp Outreach

Division (POD)

HITRAC

Chemical Security

Compliance Division (CSCD)

Infrastructure Information Collection Division

(IICD)

Infrastructure Analysis amp

Strategy Divison(IASD)

Contingency Planning amp

Incident Management

Division (CPIMD)

AdministrationChief of Staff-------------------

Dep Chief of Staff

External and International

Affairs

Assistant Secretary for Infrastructure Protection

----------------------------------------------------------------Dep Assistant Secretary for Infrastructure

Protection

DHS Office of Infrastructure Protection

8

DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by

the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government

Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under

- Freedom of Information Act (FOIA) requests

- State and local sunshine laws

- Civil litigation proceedings

CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act

9

CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs

are consistent with the NIPP and other federal-level plans programs and policies

- Built around the NIPP DHS Risk Management Framework

- Incorporates existing Infrastructure taxonomy

CACAMS integrates existing emerging DHS methodologies and reporting requirements

- Build DHS-level data models to ensure consistency across IT systems

- Push to build implement national vulnerability and risk assessment methodologies

- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo

- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 7: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

7

SSA EMO

Protective Security

Coordination Division (PSCD)

Resource Management and

Planning

Contingency Planning amp

Incident Management

Division (CPIMD)

Partnership amp Outreach

Division (POD)

HITRAC

Chemical Security

Compliance Division (CSCD)

Infrastructure Information Collection Division

(IICD)

Infrastructure Analysis amp

Strategy Divison(IASD)

Contingency Planning amp

Incident Management

Division (CPIMD)

AdministrationChief of Staff-------------------

Dep Chief of Staff

External and International

Affairs

Assistant Secretary for Infrastructure Protection

----------------------------------------------------------------Dep Assistant Secretary for Infrastructure

Protection

DHS Office of Infrastructure Protection

8

DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by

the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government

Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under

- Freedom of Information Act (FOIA) requests

- State and local sunshine laws

- Civil litigation proceedings

CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act

9

CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs

are consistent with the NIPP and other federal-level plans programs and policies

- Built around the NIPP DHS Risk Management Framework

- Incorporates existing Infrastructure taxonomy

CACAMS integrates existing emerging DHS methodologies and reporting requirements

- Build DHS-level data models to ensure consistency across IT systems

- Push to build implement national vulnerability and risk assessment methodologies

- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo

- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 8: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

8

DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program managed by

the DHS PCII Program Office is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government

Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under

- Freedom of Information Act (FOIA) requests

- State and local sunshine laws

- Civil litigation proceedings

CACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received validated and disseminated in accordance with the CII Act

9

CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs

are consistent with the NIPP and other federal-level plans programs and policies

- Built around the NIPP DHS Risk Management Framework

- Incorporates existing Infrastructure taxonomy

CACAMS integrates existing emerging DHS methodologies and reporting requirements

- Build DHS-level data models to ensure consistency across IT systems

- Push to build implement national vulnerability and risk assessment methodologies

- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo

- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 9: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

9

CACAMS Concept of Operations Use of CACAMS ensures that state local and regional CIP programs

are consistent with the NIPP and other federal-level plans programs and policies

- Built around the NIPP DHS Risk Management Framework

- Incorporates existing Infrastructure taxonomy

CACAMS integrates existing emerging DHS methodologies and reporting requirements

- Build DHS-level data models to ensure consistency across IT systems

- Push to build implement national vulnerability and risk assessment methodologies

- Allow federal state local private sector to speak the same CIKR ldquolanguagerdquo

- Will work with states and commercial vendors to ensure data consistency across tools enable integration of existing infrastructure data management tools

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 10: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

10

CACAMS Concept of Operations CACAMS leverages the close relationship between local law enforcement first

responders and the asset owneroperators- CIKR ownersoperators are a key partner in planning and use of CACAMS

- CACAMS success depends on PublicPrivate Partnerships (P3)

Focuses on gathering detailed accurate asset information pre- and post-incident vulnerability and protection planning

- Supports both EOCs and an Incident Commander during a major response effort

- Incorporates private sector equities through close regular coordination and cooperation

Allows DHS to augment its collection of CIKR data through the activities of tens of thousands of local law enforcement fire and emergency management personnel across the nation

- CACAMS CONOPS assumes that processes to identify CIKR assets are continuous and could involve hundreds of people within a large urban area

- CACAMS enables the effective inventory and management of thousands of assets within these areas

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 11: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

11

CACAMS Tools and Resources

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 12: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

12

CACAMS Tools and Resources A CIKR asset management system that focuses on the unique requirements and

information needs of first responders

Vulnerability and consequence scoring tools that aid the userrsquos subjective analysis of criticality

An integrated open source information portal Constellation tying together critical asset data and reporting about the current threat environment

A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets

Generate Buffer Zone Protection Plans (BZPPs)

Generate pre-incident operational plans for local police and first responders

Electronically available resources for first responders such as the DHS Daily Report training materials on-line manuals and ACAMS FAQs

Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 13: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

13

Inventory Why Inventory

PREVENTION Knowing whatrsquos out there and being able to develop strategies to disrupt and deter Provide physical security as needed

PLANNING You cannot protect every potential target

1048707How many targets

1048707How do you prioritize resources

RESPONSE The incident commander needs vital information on the target in a timely manner

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 14: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

14

PCII - CACAMS National Deployment Status

26 StatesTerritories Approved for PCII but no CACAMS data

09 StatesTerritories Not Approved for PCII Access

20 StatesTerritories with data loaded on CACAMS

1874 CACAMS Users as of 29 APRIL 08 31883 Assets Entered as of 29 APRIL 08

69

779

29

26

37

44

89

50

85

2846

116

6

29

1172

31

4

9

MA (113)

RI (1)

DE (4)

MD (14)

DC (58)

3

4

9

4

1

6210

11

7

3

39

2

13

4

NJ (2)

GU (2)PR (2)

USVI

AS

MP

HI (3)

3

1

- The number in each state represents total trained CACAMS users in the state

CT (10)

1

1

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 15: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

15

USER ndash State of Ohio Hierarchy Ohio has a adopted a hierarchy

with the Ohio Homeland Security Office heading State efforts

Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio Cincinnati Columbus Cleveland and Toledo

Outreach efforts are currently ongoing to the Statersquos 88 Emergency Management Directors organized in six emergency management regions

Ohio Homeland Security Office

State Fusion Center

Protective Security Planners

UASITEWGs

CincinnatiClevelandColumbus

Toledo

CountyEmergency

Management Directors

Local Law Enforcement

Fire Officials

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 16: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

16

12

34

5

67

8

Ohio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning RegionsOhio Homeland Security Planning Regions

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset

Page 17: 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

17

Summary CACAMS is a tool that can be viewed

and used at multiple levels of government to support a common operational picture during an incident or for planning

Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) ndash the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence

CACAMS builds Public-Private Partnerships

The Asset Manager Questionnaire provides the most reliable and current information for a specific asset