1 / 3

Significant Events last 24 hrs: NORAD event MAFFS flew 15 missions 336 to date Upcoming Events next 24 hrs: DHS Hurrica

. . . Sources of Information. Unclassified. Classified. Sensitive. DefenseOperationsPlans. Weather Data. NationalAssets. CommonIntelligencePicture. ForceDeployments. Law EnforcementOperations Plans. UnclassifiedSatellite Photos. UnclassifiedVessel Tracking Data. Maps

avak
Download Presentation

Significant Events last 24 hrs: NORAD event MAFFS flew 15 missions 336 to date Upcoming Events next 24 hrs: DHS Hurrica

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Brief as desired. Transition: Information Collaboration is extremely important. Begin by looking at where we get our information from.Brief as desired. Transition: Information Collaboration is extremely important. Begin by looking at where we get our information from.

    2. The subject of intelligence sharing is a sensitive one for Northern Command because it is the homeland we defend and we must be – conscious and observant of relevant laws – and we are We have an extensive collaborative network to help us assess the vast collection of information available Data which must be collected, analyzed and “fused.” We draw on all sources of information: classified, unclassified, and sensitive to create a a common operating picture, and in turn, share the information with relevant agencies. Transition: Look at our Information Environment partners.The subject of intelligence sharing is a sensitive one for Northern Command because it is the homeland we defend and we must be – conscious and observant of relevant laws – and we are We have an extensive collaborative network to help us assess the vast collection of information available Data which must be collected, analyzed and “fused.” We draw on all sources of information: classified, unclassified, and sensitive to create a a common operating picture, and in turn, share the information with relevant agencies. Transition: Look at our Information Environment partners.

    3. This is the information environment with some of our primary mission partners. List is not by any means totally inclusive. Each of these systems are “cylinders of excellence.” They are not interconnected N-NC are attempting to bridge these systems visa DSEL. Transition: Look at how we share information. This is the information environment with some of our primary mission partners. List is not by any means totally inclusive. Each of these systems are “cylinders of excellence.” They are not interconnected N-NC are attempting to bridge these systems visa DSEL. Transition: Look at how we share information.

    4. This is a build slide to depict how we see information sharing. Although the center ring is the most secure, it is also the one with the most limited access. As we move away from the center of the circle, our ability to collaborate increases, but we also incur more risk. Most of our mission partners work mainly in the outer three rings, so we must establish systems and tools that allow us to reach mission partners outside the .mil domain. The tools that we currently use correspond to the domains. These selected command tools go from the coordination category to the C2 level – All valuable when used at the appropriate level. Once again, the tightest controls are at the center of this diagram. As we grant more access we assume more risk, but at the same time we expand our reach and increase the number of mission partners. Transition: Briefly discuss HSIN. This is a build slide to depict how we see information sharing. Although the center ring is the most secure, it is also the one with the most limited access. As we move away from the center of the circle, our ability to collaborate increases, but we also incur more risk. Most of our mission partners work mainly in the outer three rings, so we must establish systems and tools that allow us to reach mission partners outside the .mil domain. The tools that we currently use correspond to the domains. These selected command tools go from the coordination category to the C2 level – All valuable when used at the appropriate level. Once again, the tightest controls are at the center of this diagram. As we grant more access we assume more risk, but at the same time we expand our reach and increase the number of mission partners. Transition: Briefly discuss HSIN.

More Related