Identity Crisis: Defining the Problem and Framing a Solution for Terrorism Incident Response Presented by Mark Landahl Supervisor – Homeland Security Section.

Slides:



Advertisements
Similar presentations
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Advertisements

June 27, 2005 Preparing your Implementation Plan.
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
National Integration Center 1 National Incident Management System Resource Management Al Fluman, Acting Director Incident Management Systems Division (IMSD),
WMD Crime Scene Management
Protecting the Public, Astronauts and Pilots, the NASA Workforce, and High-Value Equipment and Property Mission Success Starts With Safety “September 11th.
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
U.S. Department of Agriculture HSPD 12 Program HSPD 12 Personal Identity Verification (PIV) I Core Training: Issuers.
United States DoD Public Key Infrastructure: Deploying the PKI Token
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
1/13/05NCASSR PNNL Visit1 Security Tools Area Overview, Credential Management Services, and the PKI Testbed Jim Basney Senior Research Scientist
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Who We Are… The Foundation is a 501(c)(3) non-profit research organization that owns and operates the Morrelly Homeland Security Center which is the first.
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
Session 121 National Incident Management Systems Session 12 Slide Deck.
1 Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide FED/ED.
Army Family Advocacy Program 1 of R APR 06 Restricted Reporting Policy for Incidents of Domestic Abuse.
Certificate and Key Storage Tokens and Software
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
IdM Identity Proofing & Registration Gary Chapman David Millman September 2006.
Homeland Security Presidential Directive-12 (HSPD-12)
Part of a Broader Strategy
National Incident Management System Overview Briefing Fiscal Year (FY) 2006 Implementation NIMS Requirements for States and Local Jurisdictions Carole.
National Response Plan Overview [date] [location] [presenter]
1 Emergency Preparedness Update Saddleback College Irvine Valley College Advanced Technology Education Park SOCCCD Board of Trustees Meeting 6/23/08.
HSPD-12 and FIPS-201 Overview v Learning Objectives At the end of this course, you will be able to: Describe Homeland Security Presidential Directive.
A Combat Support Agency Defense Information Systems Agency Expanding Non-DOD Partnerships 17 August 2011.
National Preparedness All Hazards Consortium Corey Gruber Assistant Deputy Administrator, National Preparedness National Preparedness.
Preparedness in Pennsylvania NGA Regional Bioterrorism Workshop- Boston, MA Michelle S. Davis, Deputy Secretary Health Planning & Assessment Bill Stevenson,
PAR CONFERENCE Homeland Defense A Provider’s Perspective Lessons from TMI Dennis Felty November 15, 2001.
1 The Government-wide Implementation of Homeland Security Presidential Directive 12 (HSPD-12) David Temoshok Director, Identity Policy and Management GSA.
PIV 1 Ketan Mehta May 5, 2005.
Jared McCannell PHEP Volunteer Management Coordinator (ME-CDC) Medical Reserve Corps State Coordinator MAINE RESPONDS Emergency Health.
Use of Identity Credentials in Public Transit Fare Payment Systems Professional Capacity Building Program T3 Webinar June 29, 2011 Washington Metropolitan.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
HSPD-12 Identity Management Initiative Carol Bales Senior Policy Analyst United States Office of Management and Budget North American Day 2006.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Cyber Security & Access Controls City & County of Honolulu April 2010 Gordon J. Bruce M.B.A. (Director/Chief Information Officer)
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Smart Card Authentication Mechanism Tim W. Baldridge, CISSP Marshall Space Flight Center Office of the Chief Information Officer.
Presented by: Defense Manpower Data Center Access Card Office
Federal Preparedness Credentialing & Typing. H.R. 1 - Requirement Title IV of the “Implementing Recommendations of the 9/11 Commission Act of 2007” directs.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
The Alien Flight Student Program AFSP An overview of the applications that encompass the AFSP Program COPYRIGHT AND GOVERNMENT PURPOSE RIGHTS NOTICE Copyright.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
EAuthentication – Update on Federal Initiative Jacqueline Craig IR&C September 27, 2005.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
E-Authentication: What Technologies Are Effective?
IS-700.A: National Incident Management System, An Introduction
HIMSS National Conference New Orleans Convention Center
Appropriate Access InCommon Identity Assurance Profiles
A Quick Tour of the FIPS 201 Revision
Presentation transcript:

Identity Crisis: Defining the Problem and Framing a Solution for Terrorism Incident Response Presented by Mark Landahl Supervisor – Homeland Security Section Frederick County Sheriff’s Office (MD) Adjunct Professor – Homeland Security University of Maryland University College

Identity is defined as…. 1.the collective aspect of the set of characteristics by which a thing is definitively recognizable or known. 2. the set of behavioral or personal characteristics by which an individual is recognizable as a member of a group.

Defining the Problem: Identity Management for Terrorism Incident Response Case Studies 1)TWA Flight 800 (nexus to terrorism initially suspected) 2)World Trade Center )Murrah Federal Building Bombing 4)Pentagon 9/11 5)World Trade center 9/11

TWA Flight 800 Long Island, NY July 1996 July 1996

World Trade Center New York, NY

Murrah Federal Building Bombing Oklahoma City, OK April 1995

Pentagon Arlington, VA September 2001 September 2001

World Trade Center New York City, NY September 2001 September 2001

1.Force Protection 1.Force Protection – Safety from secondary attack by infiltration 2. Command and Control 2. Command and Control – know what you have to apply to the problem 3. Accountability & Safety 3. Accountability & Safety – Know who is on scene and where they are assigned 4. Crime Scene Mgmt. 4. Crime Scene Mgmt. – entry control & documentation Identity Management Issues for Terrorism Incident Response

Case Studies: Elements of the Problem/ Framework for a Solution 1) Identity Authentication 2) Rapid In-processing 3) Interoperability 4) Data Storage/ Promulgation Capability

What do we do about it? Options: 1) Leave it alone – low risk / too expensive to fix 2) Typed Incident Response Resource (currently no defined resource for Identity Management) 3) Nationwide Standardized First Responder Identity Credential

Option 2: Dedicated Typed Response Resource National Mutual Aid Resource Management Initiative (FEMA 120) Resource was included in the Maryland 70. Proposed additions to the FEMA 120 by the State of Maryland. Identity Management Team (IDMT)

Identity Management Team CONOPS

Option 3: Nationwide First Responder Identity Credential “Doveryai no Proveryai” Russian Proverb Requires change in identity schema and establishment of a trust model Trust consists of a two prong test 1) Process - provides assurances that an individual has been vetted through a common identity proofing process (ex. background investigation) more stringent = more trust 2) Product - (token) counterfeit resistant and ability to be authenticated = trust

Federal Government Identity Initiative HSPD-12 - Policy for a Common Identification Standard for Federal Government Employees and Contractors FIPS Defines standards in process and product for Federal identity, using interoperable smart card technology. Authenticates Identity through a three tiered system Something you have (PIV Card) Something you know (PIN) Something you are (Biometric)

National Capital Region: First Responder Authentication Card (FRAC) DoD / DHS / DOI Other Federal/State/Local Credential Issuers DoD CAC ID Cards*CRLs Validation Authority Authorization Handhelds Compressed, Signed Validation Lists Valid (produced and synchronized every 24 hours at minimum) NCR Governments Other Issuer Privileged Lists Trusted: … *CRLs – certificate revocation lists

1.Define and Type Response Resource for Identity Management 1.Define and Type Response Resource for Identity Management ( USSS) 2.Develop model communities and e-government best practices for FIPS-201 technologies 3.Study feasibility and develop a National Rollout Model 4. Add Identity management as a capability specific priority to the National Preparedness Goal Recommendations

Contact Information: Corporal Mark Landahl Frederick County Sheriff’s Office Frederick, MD