Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Constellation/Automated Critical Asset Management System (C/ACAMS)

Similar presentations

Presentation on theme: "1 Constellation/Automated Critical Asset Management System (C/ACAMS)"— Presentation transcript:

1 1 Constellation/Automated Critical Asset Management System (C/ACAMS)

2 2 ACAMS – Establishing the Universe ACAMS: a new tool for the new frontier. This is the continuing roll-out of C/ACAMS. Its indefinite mission, to explore new methods, to seek out new partners and define new and existing infrastructure, to boldly go where the federal and many, state and local governments have not gone before

3 3 Discussion Points C/ACAMS Overview Stakeholders Capabilities Concept of Operations Tools and Resources Users

4 4 Constellation / Automated Critical Asset Management System (C/ACAMS) C/ACAMS is a secure, Web-based information services portal used to support infrastructure protection efforts at the state and local level -Provides access to a comprehensive set of tools and resources to develop and implement comprehensive critical infrastructure programs -Allows users to manage the collection and effective use of asset data -Focuses on pre-incident prevention and protection but also assists in post- incident response -Designed principally as a vulnerability assessment tool DHS derives programmatic authority to build and manage C/ACAMS from: -Homeland Security Act of Homeland Security Presidential Direction (HSPD) – 7: Critical Infrastructure Identification, Prioritization and Protection -HSPD – 8: National Preparedness -National Infrastructure Protection Plan (NIPP) C/ACAMS incorporates national-level guidance to ensure consistency among state and local partners

5 5 State and Local First Responders, Emergency Managers, and Homeland Security Officials DHS Office on Infrastructure Protection, Infrastructure Information Collection Division (IICD) Los Angeles Police Department (LAPD) Operation Archangel DHS Protected Critical Infrastructure Information (PCII) Program Office DHS Federal Emergency Management Agency National Preparedness Directorate (FEMA/NPD) C/ACAMS Principal Stakeholders

6 6 Critical Infrastructure Assets in the Critical Infrastructure category include the systems, places, and people that are needed to provide continuity of operations in eighteen (18) potential sectors National Monuments & Icons Emergency Services Government Facilities Healthcare & Public Health Commercial Assets Defense Industrial Base Information Technology Postal & Shipping Telecommunications Dams Nuclear Power Water Supply and Delivery Agriculture & Food Energy (other than nuclear) Chemical / Hazardous Materials Banking and Finance Transportation Manufacturing

7 7 SSA EMO Protective Security Coordination Division (PSCD) Resource Management and Planning Contingency Planning & Incident Management Division (CPIMD) Partnership & Outreach Division (POD) HITRAC Chemical Security Compliance Division (CSCD) Infrastructure Information Collection Division (IICD) Infrastructure Analysis & Strategy Divison (IASD) Contingency Planning & Incident Management Division (CPIMD) Administration Chief of Staff Dep. Chief of Staff External and International Affairs Assistant Secretary for Infrastructure Protection Dep. Assistant Secretary for Infrastructure Protection DHS Office of Infrastructure Protection

8 8 DHS PCII Program Office The Protected Critical Infrastructure Information (PCII) Program, managed by the DHS PCII Program Office, is designed to encourage private industry and others with knowledge about our critical infrastructure to share sensitive and proprietary business information about this critical infrastructure with the federal government Critical Infrastructure Information (CII) Act (2002) prevents disclosure of PCII under: -Freedom of Information Act (FOIA) requests -State and local sunshine laws -Civil litigation proceedings C/ACAMS and Operation Archangel have implemented business processes and an automated workflow to ensure that PCII information is correctly received, validated, and disseminated in accordance with the CII Act

9 9 C/ACAMS Concept of Operations Use of C/ACAMS ensures that state, local and regional CIP programs are consistent with the NIPP and other federal-level plans, programs, and policies -Built around the NIPP, DHS Risk Management Framework -Incorporates existing Infrastructure taxonomy C/ACAMS integrates existing, emerging DHS methodologies and reporting requirements -Build DHS-level data models to ensure consistency across IT systems -Push to build, implement national vulnerability and risk assessment methodologies -Allow federal, state, local, private sector to speak the same CI/KR language -Will work with states and commercial vendors to ensure data consistency across tools, enable integration of existing infrastructure data management tools

10 10 C/ACAMS Concept of Operations C/ACAMS leverages the close relationship between local law enforcement, first responders and the asset owner/operators -CI/KR owners/operators are a key partner in planning and use of C/ACAMS -C/ACAMS success depends on Public/Private Partnerships (P 3 ) Focuses on gathering detailed, accurate asset information pre- and post-incident vulnerability and protection planning -Supports both EOCs and an Incident Commander during a major response effort -Incorporates private sector equities through close, regular coordination and cooperation Allows DHS to augment its collection of CI/KR data through the activities of tens of thousands of local law enforcement, fire and emergency management personnel across the nation -C/ACAMS CONOPS assumes that processes to identify CI/KR assets are continuous and could involve hundreds of people within a large urban area -C/ACAMS enables the effective inventory and management of thousands of assets within these areas

11 11 C/ACAMS Tools and Resources

12 12 C/ACAMS Tools and Resources A CI/KR asset management system that focuses on the unique requirements and information needs of first responders Vulnerability and consequence scoring tools that aid the users subjective analysis of criticality An integrated open source information portal, Constellation, tying together critical asset data and reporting about the current threat environment A tailorable reporting capability to assist in answering both local and national-level data calls on critical assets Generate Buffer Zone Protection Plans (BZPPs) Generate pre-incident operational plans for local police and first responders Electronically available resources for first responders, such as the DHS Daily Report, training materials, on-line manuals, and ACAMS FAQs Integrated Geospatial Information System (GIS) and mapping for use in collection process and analysis

13 13 Inventory Why Inventory? PREVENTION: Knowing whats out there and being able to develop strategies to disrupt and deter. Provide physical security as needed PLANNING: You cannot protect every potential target How many targets? How do you prioritize resources? RESPONSE: The incident commander needs vital information on the target in a timely manner.

14 14 PCII - C/ACAMS National Deployment Status 26 States/Territories Approved for PCII, but no C/ACAMS data 09 States/Territories Not Approved for PCII Access 20 States/Territories with data loaded on C/ACAMS 1,874* C/ACAMS Users as of 29 APRIL 08 31,883 Assets Entered as of 29 APRIL MA (113) RI (1) DE (4) MD (14) DC (58) NJ (2) GU (2) PR (2) USVI AS MP HI (3) 3 1 * - The number in each state represents total trained C/ACAMS users in the state CT (10) 1 1

15 15 USER – State of Ohio Hierarchy Ohio has a adopted a hierarchy with the Ohio Homeland Security Office heading State efforts Subordinate elements are being developed within the Terrorism Early Warning Groups in the four Urban Area Security Initiative Cities in Ohio: Cincinnati, Columbus, Cleveland and Toledo Outreach efforts are currently ongoing to the States 88 Emergency Management Directors organized in six emergency management regions. Ohio Homeland Security Office State Fusion Center Protective Security Planners UASI TEWGs Cincinnati Cleveland Columbus Toledo County Emergency Management Directors Local Law Enforcement Fire Officials

16 Ohio Homeland Security Planning Regions

17 17 Summary C/ACAMS is a tool that can be viewed and used at multiple levels of government to support a common operational picture during an incident or for planning Populating state assets supports the federal effort to establish the Infrastructure Data Warehouse (formerly the NADB) – the universe of assets from which critical infrastructure is determined based on Risk = Threat x Vulnerability x Consequence C/ACAMS builds Public-Private Partnerships The Asset Manager Questionnaire provides the most reliable and current information for a specific asset.

Download ppt "1 Constellation/Automated Critical Asset Management System (C/ACAMS)"

Similar presentations

Ads by Google