30 likes | 197 Views
. . . Sources of Information. Unclassified. Classified. Sensitive. DefenseOperationsPlans. Weather Data. NationalAssets. CommonIntelligencePicture. ForceDeployments. Law EnforcementOperations Plans. UnclassifiedSatellite Photos. UnclassifiedVessel Tracking Data. Maps
E N D
1. Brief as desired.
Transition: Information Collaboration is extremely important. Begin by looking at where we get our information from.Brief as desired.
Transition: Information Collaboration is extremely important. Begin by looking at where we get our information from.
2. The subject of intelligence sharing is a sensitive one for Northern Command because it is the homeland we defend and we must be – conscious and observant of relevant laws – and we are
We have an extensive collaborative network to help us assess the vast collection of information available
Data which must be collected, analyzed and “fused.”
We draw on all sources of information: classified, unclassified, and sensitive to create a a common operating picture, and in turn, share the information with relevant agencies.
Transition: Look at our Information Environment partners.The subject of intelligence sharing is a sensitive one for Northern Command because it is the homeland we defend and we must be – conscious and observant of relevant laws – and we are
We have an extensive collaborative network to help us assess the vast collection of information available
Data which must be collected, analyzed and “fused.”
We draw on all sources of information: classified, unclassified, and sensitive to create a a common operating picture, and in turn, share the information with relevant agencies.
Transition: Look at our Information Environment partners.
3. This is the information environment with some of our primary mission partners.
List is not by any means totally inclusive.
Each of these systems are “cylinders of excellence.” They are not interconnected
N-NC are attempting to bridge these systems visa DSEL.
Transition: Look at how we share information.
This is the information environment with some of our primary mission partners.
List is not by any means totally inclusive.
Each of these systems are “cylinders of excellence.” They are not interconnected
N-NC are attempting to bridge these systems visa DSEL.
Transition: Look at how we share information.
4. This is a build slide to depict how we see information sharing. Although the center ring is the most secure, it is also the one with the most limited access. As we move away from the center of the circle, our ability to collaborate increases, but we also incur more risk. Most of our mission partners work mainly in the outer three rings, so we must establish systems and tools that allow us to reach mission partners outside the .mil domain.
The tools that we currently use correspond to the domains. These selected command tools go from the coordination category to the C2 level – All valuable when used at the appropriate level.
Once again, the tightest controls are at the center of this diagram. As we grant more access we assume more risk, but at the same time we expand our reach and increase the number of mission partners.
Transition: Briefly discuss HSIN.
This is a build slide to depict how we see information sharing. Although the center ring is the most secure, it is also the one with the most limited access. As we move away from the center of the circle, our ability to collaborate increases, but we also incur more risk. Most of our mission partners work mainly in the outer three rings, so we must establish systems and tools that allow us to reach mission partners outside the .mil domain.
The tools that we currently use correspond to the domains. These selected command tools go from the coordination category to the C2 level – All valuable when used at the appropriate level.
Once again, the tightest controls are at the center of this diagram. As we grant more access we assume more risk, but at the same time we expand our reach and increase the number of mission partners.
Transition: Briefly discuss HSIN.