1 / 38

CIP R&D Plan Briefing and Correlation to SDR Grand Challenges

This briefing discusses the rise and drivers of terrorism, organized crime, natural disasters, economic stability, competitive strength, and resource management as they relate to critical infrastructure protection. It outlines the goals, issues, and actions required to anticipate, detect, protect, discover, respond, and recover from threats to critical infrastructure.

wellman
Download Presentation

CIP R&D Plan Briefing and Correlation to SDR Grand Challenges

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIP R&D Plan Briefing and Correlation to SDR Grand Challenges

  2. Infrastructure Sectors

  3. Drivers Terrorism – Rise in foreign and domestic now and issues that precipitate them are increasing Organized Crime – Aiding and emulating terrorism Natural Disasters – Global changes and shortages Economic Stability – Globalization making model fragile Competitive Strength - Increasing Competition at levels the US will have difficulty addressing Resource Management – Raw materials become ever greater sources of conflict

  4. Vision Federal agencies have re-aligned around a common vision for Critical Infrastructure Protection R&D and are partnering in high-payoff investments to fill gaps. The Critical Infrastructure sectors* endorse the planned federal R&D investment Government is working with the private sector to implement technology quickly after development based on up-front teaming on requirements, and advanced planning for technology implementation. The federal government is working with foreign governments to coordinate R&D, and where appropriate, technology implementation, for the protection of Critical Infrastructures. * includes owners and operators of Critical Infrastructure and key assets

  5. Goals Anticipate – Changes, Drivers, Threats, Actors, Demands Detect – Issues, Disruptions, Weapons, Resources Protect – People, Assets, Continuity, Stability Discover – Emerging Threats, Building Crises Respond – Events, Consequences, Needs Recover – Post-event, Post-cure, Post-remembrance

  6. Issues What Must Be Done – The inescapable we must do What Can We Afford – The optional where the Value Proposition Is Compelling Who Will Do – Government, Public, Private, Personal Who Will Pay – Government, Public, Private, Personal Who Will Maintain – Initial, Short-term, Long-term Who Will Continuously Improve – Same Actors, New Script

  7. Players Government – All Levels, not all entities within them Industry – Providers, Users, Owners, Operators National Labs – Is Their Model Viable In This Context Military – Where is line now and where will it be after multiple attacks that overwhelm civilian resources Intelligence Community – Before shakeup is locked in stone, homeland security must be rethought in this context Academia – What is the wartime equivalent role and way in which it is activated strongly but securely – Lincoln Lab??? Other Countries – We will need their resources and help and this must be automatic – new treaties, new agencies/roles

  8. Resources Government – All Levels – Tremendous Asset Where Even The Participants In One Agency Do Not Know Each Other Industry – Providers, Users and Owners – Need New Models For Relationships That Can Be Triggered In Hours, Not Months National Labs – Their Archives and Past Efforts Must Be Mined As Aggressively As New Capability Is Pursued Military – They Have Much Of What We Need, But Not In A Commercially Acceptable Form – How Do We Transfer Intelligence Community – Lots of Changes and New Processes Academia – Need Careful Selection and Higher Certainty Of End Contribution, Whether Positive or Negative Other Countries – They Have Been Here Longer In Many Situations We Just Began Considering – We Must Learn Better.

  9. Venues Local – Emergency responders and medical are not the only issue here State – Model of not only who is in charge but who received and manages funds and sets metrics. Using highway model is wrong Regional – This is a real and separate entity but not recognized by current statutory view – bulk of the strength and resources Federal – What role should they play – we must not assume past activities provide a valid model for the future International – Others have been here a long time – learn alot Outlaw and non-Nations – What are their beefs and capabilities and what conduits does CIP have to understand these so they can be more proactive with IC community

  10. Enablers Multi-Use Breadth of Application – Only Way To Ensure Continuity Dual-Use Value and Benefits Opportunities – Commercial Hurdle Tax, insurance, market incentives and metrics – All Must Be Considered And New Vehicles Developed Environmental and Social Support Needs – Can Be A Positive Enhancement of Infrastructure As It Is Renewed - Synergy Preparation For Future Kinds of Infrastructure On Which We Will Also Become Dependent

  11. Limits Size – Literally millions of targets for everything from foreign to domestic to insider to nutcase Complexity – Map of dependencies and requirements has never been done Money – Even 1% of assets cannot be addressed fully Talent – Current DHS talent will be redispersed as IPA’s go home and Baby Boomer impacts begin to hit all government Time – A great idea now reaches commercial level a minimum of five years from now without new processes Technology – We have immense capability in the wrong place in the wrong form and often inaccessible to public Collaboration – Never been encouraged, often discouraged

  12. Balance Critical Infrastructure Vs All – Making Choices and Educating CIP Vs Homeland Security – Small, Visible Subset Homeland Security and Homeland Defense – We Must Align And Minimize Duplicate Efforts In All Facets Homeland Defense Vs Combating Terrorism - Understand The Significant Disparity In Probabilities Public Vs Private – Unless Each Has Their Own Office Park And Economy, We Are All In This Together Funded Vs Incentive Vs Expected – All Will Be Involved

  13. Finally, We Have The SCC’s and Their GCC Counterparts Interfaces Industry – Owners Industry – Vendors Industry – Service Providers Government – Regulatory Government – All Levels Law Enforcement and Response Government – Agencies With CIP-related Roles Non-Government Organizations – They Can Be Critical

  14. Dependencies Intra-Dependent – Agency Contributors Inter-dependency - Other DHS Portfolios Co-Dependent – Intelligence Community Co-Conspirator – Regional, State and Local Collaborator – Vendors, Suppliers Champion – House, Senate and EOP HS Lead Organizations

  15. Validated By EOP, OMB Gov, Labs, Industry And Academia • CIP Themes • Detection • Protection • Entry Portals • Insider Threats • Decision Support • Response & Recovery • Emerging Threats • Advanced Architecture • Social, Behavioral, Economic

  16. Three National Strategic Goals • For Critical Infrastructure Protection • National Common Operating Picture • Inherently Secure National Network • Self-Repairing, Self-Healing Systems

  17. Primary Focus Areas

  18. Primary Focus Areas

  19. Primary Focus Areas

  20. Needs From Others

  21. A L I G N P L A N U P D A T E W I T H F E D E R A L B U D G E T C Y C L E 2004 2005 2006 2007 Assemble Infrastructure Subcommittee of the NSTC Workshops held with Industry, academia And government labs To present and verify plan Re-verify Themes and Focus areas of plan with GCC’s and SCC’s Re-verify Themes and Focus areas of plan with GCC’s and SCC’s F I R S T P U B L I C R E L E A S E O F C I P R O A D M A P F I R S T P U B L I C R E L E A S E O F C I P R & D P L A N Develop basic structure for CIP R&D Plan per HSPD-7 Begin development of Roadmap that will allow Roles and responsibilities To be examined Compare CIP R&D Plan With sector annual reports On progress on NIPP Plan efforts Compare CIP R&D Plan With sector annual reports On progress on NIPP Plan efforts Assemble broad collection of groups to develop basic Elements of plan Examine budgets already Planned for sector-specific HS efforts and begin a Gap analysis by sector Update maturity diagram Update maturity diagram Themes identified and Confirmed with agencies And key offices Develop a maturity Diagram that shows Where additional effort Is needed for focus areas Bring forward key asset And critical infrastructure List and updated threat List to prioritize investment Bring forward key asset And critical infrastructure List and updated threat List to prioritize investment Focus areas developed In discussions with Agencies and academia Connect CIP R&D Plan To the NITRD CSIA Cyber security plan and Compare for gaps Incorporate all the above In the Roadmap and look For gaps that will need Additional funding Analyze All Inputs and Activities Pursued By All Contributors and Plan New Independent CIP Funding of Gaps Must Complete First Version Before Can Discuss With Public, Industry, Labs or Academia Must Integrate With All Other Homeland Security S&T Plans including cyber, ER, WMD and Intel Convert CIP R&D Plan Into an expanded Variation of the NIPP Annual Progress Reports

  22. We Do Not Know What We Don’t Know Completely New Model Clearance & Systems New Agreements Extended Research New Agreements Research Your Current Knowledge Commercially Available Commercial R&D Military Available Military R&D Intelligence Available Intelligence R&D Territory We Must Penetrate If We Are To Succeed

  23. National CIP R&D Data Collection Information on projects, programs and special efforts gathered from 29 Federal databases and repositories 513,300 projects and references extracted using 436 queries designed Around the primary characteristics of the 17 infrastructure sectors and All threats they could possibly experience Total extraction manually reviewed over a seven month period to yield A verified collection of 71,604 projects including projects from 1986 to Projects not due until 2027. Each project read in detail and characterized As 1) directly related; 2) indirectly related or 3) potentially related in future Collection is organized in four major groupings By Agency – DHS, DOD, etc. By Sector – Electric Power, Commercial Infrastructure, etc. By Major Threat Topic – IED’s, Explosives, Bio-weapons, Non-lethal By Special Topic On Request – School Safety, PITAC Report Access – Currently Tightly Controlled Until Legal Basis Set and Security Tiers Established

  24. HSPD-7 Defined Sectors Department/Agency/Branch All Sectors Via NIPP R&D Chapters and the NIPP Annual Progress Reports DOE Argonne LLNL Sandia NNSA DOI BoR DOJ FBI NIJ DOT FHWA RITA EOP NITRD NBI OMB OSTP EPA FDA HHS NIH Intelligence ODNI CIA DIA IC-RandD NSA NASA NRC NSF USDA DHS NCS TSA DOC NIST DOD Air Force Army Marines Navy DARPA DISA DLA DTRA ERDC OSD SpOps USACE Special Collections Threat/Mitigation Topics Biometrics CBRN CTCC Cyber Security Directed Energy EMP Explosives Guard HVAC Nano Non-Lethal Robots SBE Tagging Terahertz Visualization British CIP R&D British Home Office CENDI Commercial Infra. SCC Dams DNA EU CIIP Gov. Facilities GCC HIFLD NAS Making Nation Safer NIMA NIPP R&D Chapters PITAC Cyber Study School Security Tagging and Identity

  25. Banking and Finance Agriculture and Food Chemical Industry/ Hazardous Materials Water Public Health Postal & Shipping Emergency Services Nuclear Power Plants Government Services Dams Defense Industrial Base Government Facilities Information and Telecommunications Major Events National Monuments & Icons Energy Transportation 10 5 1 DetectionProtectionEntryInsiderDecisionResponseEmergingAdvancedSocial PortalThreats SupportRecoveryThreatsArchitectureBehavioral

  26. Role-based Information Aggregation Compo Power Power Sys Delivery Assist Access Func LawEnf N A T I O N A L R E G I O N A L Comm Water Water Delivery Access A S S E TS Proc Medical Medical L O C A L S TATE Supply EMT Hospital Proc Power Common Operating Picture Trans Trans Stockpiles Know Water LawEnf Food/Ag Transport Org Food Govern Govern Military Feed Hazmat Feed Feeds Know Comm Stockpiles Fire Spares Medical Medical Know Reg Delivery Supply Aggregation 4 Human Aggregation 3 Aggregation 2 Aggregation 1

  27. Agency Missions As One Would Expect To See Them Prior To HS Concerns Homeland Security CIP Missions Collaboration Dynamics Independent Mission Maps

  28. Collaboration Dynamics Addition of Needs Based On Recent Threat Matrix Things That Will Require New Funding The Fortunate Confluence Where National CIP Needs Match Plans And Capabilities Agencies Intended To Field For Other Reasons. LEGEND Areas That Involve Issues Dictated By Current Threat Matrix

  29. Commercialization Plan Implementation Plan Investment Plan Tech Transfer Plan Legal Plan Contribution Plan Elements Policy Plan Field Prototype Bench Prototype Concept Perfection Basic Science Each box represents an effort by an agency towards completion of the overall life cycle of the contribution Contribution Multi-layer Model

  30. CIP R&D Plan Briefing and Correlation to SDR Grand Challenges

More Related