Command, Control and Interoperability Division
![]() |
![]() | This article includes a list of references, related reading, or external links, but its sources remain unclear because it lacks inline citations. (July 2010) |
The Command, Control and Interoperability Division is a bureau of the United States Department of Homeland Security's Science and Technology Directorate, run by Dr.David Boyd. This division is responsible for creating informative resources(including standards, frameworks, tools, and technologies) that strengthen communications interoperability, improving internet security and integrity and accelerating the development of automated capabilities to help identify potential threats to the U.S. The purpose of this division is to enable seamless and secure interactions among homeland security stakeholders. This means enhancing the ability of owners to communicate, share, visualize, analyze and protect information through this practitioner-driven approach. The "Command, Control and Interoperability Division's" vision is for stakeholders to have comprehensive, real-time, and relevant information to create and maintain a secure and safe nation. [1]
Customers include local, tribal, state, federal, international, and private emergency response agencies; agencies that plan for, detect, and respond to hazards; and private-sector partners that own, operate, and maintain the nation's cyber infrastructure.[2]
Five Program Areas
The CCID is managed by the DHS Directorate for Science and Technology. This division works to accomplish their mission of creating and deploying information resources to enable seamless and secure interactions among homeland security stakeholders. It is organized through five program areas: Basic/Futures Research; Cyber Security; Knowledge Management Tools; Office for Interoperability and Compatibility; and Reconnaissance, Surveillance, and Investigative Technologies.
Basic/Futures Research
The Basic/Futures Research Program Area is led by Dr. Joseph Kielman. The program was put in place to conduct long term, fundamental research in support of CCID; as well as to advance technologies that can serve the department and the local, tribal, state, federal, and international partners. This program area also develops and fosters a research community to identify and demonstrate novel information discovery, analysis, and management concepts and capabilities. This enables the division to identify, assess, minimize or prevent the impact of terrorist attacks and natural or man made disasters.
Within the Basic/Futures Research Program are two programs. The first is known as the Visual Analytics and Precision Information Environments Program; and the second includes the Discrete-Element Computing, Privacy, and Forensics Program.
The Visual Analytics and Precision Information Environments Program uses visually-based mathematical methods and computational algorithms to discover, manipulate, or comprehend diverse data. The program also conducts research on novel advanced technologies and techniques for understanding and manipulating information in multiple forms or modes. These techniques tend to include text, video, images, audio, databases, and sensor data. The knowledge found through this program helps to anticipate terrorist incidents and/or catastrophic events. [3]
The Discrete-Element Computing, Privacy, and Forensics Program consists of software algorithms and hardware architectures that access, process and manage multiple types and modes of information. This program assesses threats and consequences, ensuring information privacy and securing the cyber infrastructure while protecting telecommunications interoperability.[4] The Discrete-Element Computing, Privacy, and Forensics Program provides real-time data analysis and decision support against potential threats and imminent disasters. [5]
Cyber Security
The CCID Cyber Security Program Area is run by Dr. Douglas Maughan. The program specializes in cybersecurity research, development, testing, and evaluation in order to decrease the amount of economic and national security threats on our nation. This will help secure the nation’s current and future critical cyber infrastructure in support of the Department of Homeland Security operational missions and the priorities established in the President’s National Strategy to Secure Cyberspace. [6]
Cyber Security has three program areas within the overall program: Information Infrastructure Security (IIS), Cyber Security Research Tools and Techniques (RTT), and Next Generation Technologies (NGT.) [7]
Knowledge Management Tools
The Knowledge Management Tools program area of Command, Control, and Interoperability is lead by Dr. John Hoyt and provides knowledge management capabilities to reduce the risk of terrorist attacks, prepare for natural and man-made disasters, and provide an effective response to these disasters. Knowledge Management Tools also develops new tools, devices, and methods to process and analyze massive amounts of information that are widely dispersed and are found in multiple forms. It is important for this program area to work collaboratively to complement efforts in the intelligence, law enforcement, and homeland securities communities.
Notes
- ^ http://www.dhs.gov/xabout/structure/gc_1224532340996.shtm
- ^ http://www.dhs.gov/xabout/structure/gc_1224532340996.shtm
- ^ http://www.dhs.gov/files/programs/gc_1218474924792.shtm#30
- ^ http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf
- ^ http://www.dhs.gov/files/programs/gc_1218474924792.shtm#10
- ^ http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf
- ^ http://www.cyber.st.dhs.gov/public/CATCH/Boyd.pdf
External links
- Command, Control and Interoperability Division official government website
- Heritage Foundation article on DHS
- Command, Control and Interoperability Division