Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004.

Slides:



Advertisements
Similar presentations
GIS Executive Council and Advisory Committee Update November 2010.
Advertisements

SOA for EGovernment 1 Emergency Services Enterprise Framework: A Service-Oriented Approach Sukumar Dwarkanath COMCARE Michael Daconta Oberon Associates.
Homeland Security at the FCC July 10, FCCs Homeland Security Focus Interagency Partnerships Industry Partnerships Infrastructure Protection Communications.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
1 Pipeline Security Presented to: Pipeline Safety Trust New Orleans, Louisiana November 5, 2010.
Creating Relevance and Reuse with Targeted Semantics Michael C. Daconta Metadata Program Manager November 16, 2004.
© 2004 – Fairfax County Government - DIT Information Sharing Standards and Architecture.
Semantic Interoperability Community of Practice (SICoP) Semantic Web Applications for National Security Conference Hyatt Regency Crystal City, Regency.
Food Safety and Inspection Service U.S. Department of Agriculture Homeland Security: Protecting the U.S. Food Supply Office of Food Security & Emergency.
The National Incident Management System
Introduction to ebXML Mike Rawlins ebXML Requirements Team Project Leader.
Embedding Records Management into Agency Processes The FEA Records Management Profile Laurence Brewer, CRM National Archives and Records Administration.
Food and Agriculture Sector Coordinating Councils John L. Williams, DVM U.S. Department of Agriculture AFDO Annual Conference Kansas City, MO June 7, 2005.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
FEA DRM Management Strategy 11 October 2006 “Build to Share”
Program Manager, Information Sharing Environment UNCLASSIFIED ISE Enterprise Architecture and Common Standards Program.
Leveraging the Present Flexible for the Future Florida’s Regional Information Sharing NGA Best Practices INFORMATION SHARING & HOMELAND SECURITY.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
SAML, XACML & the Terrorism Information Sharing Environment “Interoperable Trust Networks” XML Community of Practice February 16, 2005 Martin Smith Program.
Tom Clarke VP, Research & Technology National Center for State Courts.
National Information Exchange Model (NIEM) Executive Introduction March 6th, 2007 Donna Roy Director, DHS Enterprise Data Management Office Chair, NIEM.
BSAF-BIONET Meeting Robert J. Hashimoto, CBSP University of California, Berkeley October 2, 2009.
Disaster Management eGov Initiative (DM) Program Overview December 2004.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Information Sharing Challenges, Trends and Opportunities
FEA DRM Success Strategy Michael C. Daconta Metadata Program Manager February 3, 2005.
Global JXDM Executive Briefing National Information Exchange Model.
SEARCH Membership Group Systems & Technology PAC Global Justice XML Data Model (GJXDM) Update January 29, 2005.
XML Profile of the FEA DRM Michael C. Daconta Metadata Program Manager November 4, 2004.
Cairo Corporation An Inc 500 Company ISO9001:2000 CERTIFIED 8(a) ۰ SDB ۰ WOB ۰ GSA ۰ GSA STARS The Dream of a Common Language: Extending the Role of the.
1 Emergency Management Standards EM- XML Consortium & EM Technical Committee Presentation to Steve Cooper March 18,2003.
National Information Exchange Model Presented by : Mini Kanwal June, 09.
NIEM Information Exchange Package Documentation (IEPD) Mini Kanwal NIEM Technical Advisor Department of Homeland Security September, 7 th 2006.
National Information Exchange Model (NIEM) Overview February 7, 2006 Dave Roberts NIEM Communications and Outreach.
FEA DRM Management Strategy Presented by : Mary McCaffery, US EPA.
11/11/2015 8:26 AM Office of the Chief Information Officer Department of Homeland Security Metadata Center of Excellence The Data Reference Model: The.
Implementing Semantic Web in Government An SLA 2006 conference program sponsored by the Information Technology Division and the Government Information.
A Brave NEtWork World Rob Willis, Ross & Associates Node Mentoring Workshop New Orleans, LA February 28, 2005.
11/20/2015 9:53 PM Office of the Chief Information Officer Department of Homeland Security Metadata Center of Excellence The Data Reference Model: Milestone.
1 DAS Annual Review June 2008 “Build to Share” Suzanne Acar, US DOIAdrian Gardner, US National Weather ServiceCo-Chair, Federal DAS
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
The FEA Data Reference Model V2.0 Michael C. Daconta, DRM Working Group Lead Susan Turnbull, AIC Representative Mary McCaffery, FEA PMO Representative.
National Information Exchange Model (NIEM) NGA Executive Policy Forum Santa Fe, NM May 2-3, 2005 Bob Greeves Bureau of Justice Assistance U.S. Department.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
WSDL – Web Service Definition Language  WSDL is used to describe, locate and define Web services.  A web service is described by: message format simple.
Connecting People With Information Transforming the Way the DoD Manages Data M. David Allen OASD(NII)/DoD CIO May 23, 2006 “The.
Information Architecture The Open Group UDEF Project
Decoding the Alphabet Soup: Global JIS Standards 101.
Collaboration & Transformation Special Interest Group Information Sharing Committee Observations August 2011.
1 Harmonizing Taxonomies: Draft for Discussion at the OASIS eGov Technical Committee Meeting Brand Niemann US Environmental Protection Agency January 6,
National Information Exchange Model (NIEM) October 24, 2006 Jeremy Warren Deputy Chief Technology Officer U.S. Dept. of Justice.
U.S. Department of Justice Law Enforcement Information Sharing Program (LEISP) Spring 06 - Global Advisory Committee (GAC) Meeting Vance Hitch, Chief Information.
Know the Earth…Show the Way NATIONAL GEOSPATIAL-INTELLIGENCE AGENCY Approved for Public Release PA Case NGA’s Standards Program Karl Koklauner Deputy.
National Geospatial Enterprise Architecture N S D I National Spatial Data Infrastructure An Architectural Process Overview Presented by Eliot Christian.
2/28/2016 1:14 PM Office of the Chief Information Officer Department of Homeland Security Metadata Center of Excellence The FEA Data Reference Model: Business.
The FEA Data Reference Model V1.5 Michael C. Daconta, DRM Working Group Lead Susan Turnbull, AIC Representative Mary McCaffery, FEA PMO Representative.
Enable Semantic Interoperability for Decision Support and Risk Management Presented by Dr. David Li Key Contributors: Dr. Ruixin Yang and Dr. John Qu.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
3/16/2016 6:17 AM Office of the Chief Information Officer Department of Homeland Security Metadata Center of Excellence The Evolution of the Data Reference.
ESA UNCLASSIFIED – For Official Use INSPIRE Orthoimagery TWG Status Report Antonio Romeo ESRIN 15/02/2012.
IPDA Registry Definitions Project Dan Crichton Pedro Osuna Alain Sarkissian.
Integrated Public Alert and Warning System
GEA CoP DRM Briefing for July 13 Meeting with Andy Hoskinson
Brand Niemann, US EPA and
Universal Core Task Force Connecting People With Information
Department of Homeland Security Metadata Center of Excellence
Federal Protective Service
About The Federal Data Architecture Subcommittee (DAS) 2008
This is an introductory slide added to the front of the briefing to explain why it has been posted on this WIKI. My name is Robert Lewis
Prevention, Intelligence
Presentation transcript:

Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004

Michael C. Daconta March 15, Agenda  Where we are Today…  What is the DRM?  The Information Sharing Imperative  Information Sharing Use Case  Where is the DRM Going?  DRM Working Group  Volume Strategy  Implementation Profiles  Conclusion

Michael C. Daconta March 15, Where we are today…  Volume 1 is released.  1-fea.html 1-fea.html  Agency comments have been collected  Send your comments to  We plan on posting comments (without attribution) to a public site.  DRM Working Group planning is underway  Broad participation including State and Local  Address Business and Technical Issues  Foster broad adoption and implementation  Satisfy the Presidential Orders/Directives

Michael C. Daconta March 15, What is the DRM? (1) - Describe  Logical Data Modeling.  Class, Property, Data Type, Association  Goals:  Unambiguous!  Defined  Registered

Michael C. Daconta March 15, What is the DRM? (2) - Discover  Taxonomy  Article at XML.com  Context is more than categorization.  Business Rules  Reification  Pragmatics

Michael C. Daconta March 15, What is the DRM? (3) - Share  XML Messaging, Federated Query, Concepts still evolving…  NIEM Announcement - Feb. 28 th :

Michael C. Daconta March 15, The Information Sharing Imperative: EO 13356: Strengthening the Sharing of Terrorism Information to Protect Americans  Section 1. Policy: “Agencies shall … give the highest priority to … interchange of terrorism information among between agencies and appropriate authorities of States and local governments [while protecting] the freedom … of Americans….”  Section 3. Preparing Terrorism Information for Maximum Distribution within Intelligence Community. IC Agencies shall set forth “standards for sharing of terrorism information by agencies within the Intelligence Community with [through DHS] appropriate authorities of State and local governments.”  Section 4. Requirements for Collection of Terrorism Information Inside the United States. Attorney General, Secretary for Homeland Security, and the DCI shall jointly submit their “recommendation on the establishment of executive branch-wide collection and sharing requirements, procedures, and guidelines for terrorism information to be collected within the United States, including, but not limited to, from publicly available sources, including nongovernmental databases.  Section 5. Establishment of the Information Systems Council. “The mission of the Council is to plan for and oversee the establishment of an interoperable terrorism information sharing environment to facilitate automated sharing of terrorism information among appropriate agencies….”

Michael C. Daconta March 15, DRM Use Case: Information Sharing Description Sharing Context Org 1 Org 2 Data Elems Data Elems Exchange packages Registry COI Context Core Context Components Assembly Discovery

Michael C. Daconta March 15, Information Sharing Use Case (1)  Markle Report.  “Creating a Trusted Network for Homeland Security”  Vignette 3.  Scenario: Terrorists planning an attack on Rail lines using Chlorine gas

Michael C. Daconta March 15, Information Sharing Use Case (2)  Agency X collects data.  Using the DRM, Agency X creates metadata that describes this data in an unambiguous manner. Rail Yard Terrorist Organization: + name: “Al Qaeda” Incident + when + where + what + who Zoo Person Chemical Plant Terrorist Terrorist Organization + name Chemical + name Chemical + name: “Chlorine”

Michael C. Daconta March 15, Information Sharing Use Case (3)  Agency Y needs data to perform analysis.  Agency Y discovers Agency X has the data it needs Target Organization Indicators Vulnerability Capability Law Enforcement Law Enforcement Intel Infrastructure Protection Lethal Agent Facility LOB

Michael C. Daconta March 15, Information Sharing Use Case (4)  Agency Y and Agency X assemble Exchange Packages. Incident Report + who + what + when + where + activity Humint Report Threat Report TargetCapability Police Incident Infrastructure Incident CriticalNon-Critical Chemical Plant Rail YardZoo

Michael C. Daconta March 15, Information Sharing Use Case (5)  Data is exchanged. CIA Rail Yard Police Dept. Zoo Chemical Plant Infrastructure Protection Intel Law Enforcement Law Enforcement Law Analysis Center Industry Analysis Center States Shared Space DHS Threat Report Incident NCTC DHS

Michael C. Daconta March 15, Information Sharing Use Case (6)  Data is associated in a shared space. Shared Space Threat Report 1 Capability: Chlorine Gas Target: Rail Lines Incident 2: Police Incident 3: Chemical Incident 1: Zoo Incident 4: Rail Yard

Michael C. Daconta March 15, Where is the DRM Going?  DRM Working Group  Volume Strategy  Implementation Profiles

Michael C. Daconta March 15, Working Group Structure  Three tiers  Public participation  Virtual  “Wiki”  Quarterly F2F Forums  Team participation  Stakeholders, Team Leads/Editors  Bi-Weekly Meetings  Business Sponsor Group  Executive Committee  Dispute Resolution  Weekly Meetings Public Teams Exec

Michael C. Daconta March 15, Volume Strategy (*OFFICIAL*)  Change the volume strategy from the current plan by creating cohesive volumes around functional lines.  Overview  DRM Management Strategy  Description  Exchange (possibly broadened to Information Sharing)  Context  Sections in each of the above on Security & Privacy  Given broad virtual participation and active Stakeholder involvement, execute the volumes in parallel  Implementation Profiles  Relational  XML  Semantic Technologies

Michael C. Daconta March 15, Revised DRM Structure Subject Context Security ContextService Context Information Access Data Element Description Resource Description Subject Area Association Query Class Association Resource Class Association Data Property Data Class Unique Identifiers Association Security Class Association Subject Class Association Input/Output Service Class Who What When Where Why Context Information Exchange Exchange Payload Association Exchange Class Sharing Description Structured Semi-Structured Unstructured

Michael C. Daconta March 15, XML Profile of the DRM Subject Context Security ContextService Context Information Access Data Element Description Resource Description Who What When Where Why Context Information Exchange Sharing Description Structured Semi-Structured Unstructured XML Topic Map & OWL Lite Web Service Entry (UDDI) IC Information Security Marking “Message” XML Schemas Federated Query & RSS DOD Discovery Medata Spec XML Schema Types XLINK

Michael C. Daconta March 15, Conclusion  How you can help!   For stakeholders, we need more editors and contributors!  Comment on the DRM  Comment on the Success Strategy  Questions?