Mobile Security Screening May 5, 2010

62

description

Mobile Security Screening May 5, 2010. Presenters: Peggy Lane, BlueStar [email protected] Jeff Webster, INPUT [email protected] - Joseph Robinson, Salamander Technologies [email protected]. BlueStar’s Government Initiative. - PowerPoint PPT Presentation

Transcript of Mobile Security Screening May 5, 2010

Page 1: Mobile Security Screening May 5, 2010
Page 3: Mobile Security Screening May 5, 2010

• BlueStars Government initiative was created for resellers who currently sell into government, as well as for those interested in developing new government business.

•Demand Generation•Educational Seminars and Webinars•ISV Solutions Development and Teaming•Grant Writing•Municipal Leasing

Page 4: Mobile Security Screening May 5, 2010

• Plan your market strategy• Partners need to determine the size of your market opportunity and define your

short and long term government business strategies and goals. BlueStars expertise strategic planning, government procurement, will grow your business

• Define your Sales Territories and Educate your Team• Having a highly skilled and knowledgeable team selling to the right customer at the

right time makes the difference between bidding… and bidding and winning. • Develop and Grow your Government Pipeline• Creating a qualified pipeline is critical to accurately forecast revenue and make

informed bid decisions. BlueStar has the resources you need to build a winning pipeline.

• Develop Winning Proposals• Pursuing bid opportunities with an understanding of your government prospect’s

pain-points and objectives means viewing the bid opportunity from their perspective.

Page 5: Mobile Security Screening May 5, 2010

• E-Citation and Code Enforcement• First Responder Accountability• Security Screening Mobile Data Access• Inspections and Maintenance• Asset Management

Motorola Government Application Segments

Page 6: Mobile Security Screening May 5, 2010

• Government Opportunities - Get the latest on the opportunities you choose to track • Agency Information - Access opportunities, contracts, news, and more for agencies

of interest to you • States - Access opportunities, contracts, news, and more for states of interest to you • Local Governments - Access opportunities, contracts, news, and more for local

governments of interest to you • Companies - Up-to-date news and awards for competitors and partners you follow • Grants - Receive easy access to your marked grant programs and awards • Task Orders - Stay up-to-date on the task orders you are interested in

BlueStar Bid Opportunities and Industry Information

Page 7: Mobile Security Screening May 5, 2010

• Educational series for our partners to understand purchasing and funding cycles for Federal, State and Local Government.

• Vertical focused: Education, Public Safety, First Responder’s, Health etc..

Motorola Government 101 Grants 101 Webinar Series

Page 8: Mobile Security Screening May 5, 2010
Page 9: Mobile Security Screening May 5, 2010

Deliver Solution

BlueStar ISV Partnerships:

BlueStar Inc. is closely aligned with a select network of strategic ISV partners offering unique and customizable vertical solutions for Public Safety, State & Local Government, Industrial, Commercial, RFID and Retail market segments. We understand the need to build new solution sets that will allow you to grow your business in today's competitive markets

Page 10: Mobile Security Screening May 5, 2010

• Creative financing and leasing options for our Partners who sell

into the public sector.

• Our technology distribution expertise and focus in providing technology solutions to State and Local governments, affords us a thorough understanding into the unique financial and budgetary needs that the public sector requires.

• BlueStar offers multiple options of Municipal Leasing and allows

our resellers to tailor specific lease structures for the distinct requirements of government entities.

Page 11: Mobile Security Screening May 5, 2010

Peggy Lane 800-354-9776 x3313 [email protected]/motorola

Page 12: Mobile Security Screening May 5, 2010

© 2010

State and Local Public Safety/Homeland Security Grants

Jeff WebsterSenior Analyst, Justice/Public Safety & Homeland SecurityINPUT

May 5, 2010

Page 13: Mobile Security Screening May 5, 2010

© 2010

Agenda

13

Grant process

Finding Grants and using them

Commonly used Homeland Security grant programs for asset and evidence management

Stimulus

Best practices and tips

Page 14: Mobile Security Screening May 5, 2010

© 2010

Grant Classifications & Sources of Information

14

How does the federal grant process work?

Grant Classifications• Direct

• Pass-Through

Further Classifications• Competitive

• Formula

Sources of Grant Information• INPUT’s Grants Database• Grants.gov• Federal Register• Monthly Treasury Statements fo

r Grants Funding• Catalog of Federal Domestic As

sistance

Page 15: Mobile Security Screening May 5, 2010

© 2010 15

Finding Grants and Using Them

Page 16: Mobile Security Screening May 5, 2010

© 2010 16

Finding Grants

Grants are published in the Catalog of Federal Domestic Assistance (CFDA)• Search by Keyword

• Search by Program Number

• CFDA.gov

Grants.gov

FEMA Preparedness Grant• Search grant programs by equipment type

Page 17: Mobile Security Screening May 5, 2010

© 2010 17

Utilizing Grants

Agencies utilize grant funds for the following:• Equipment

• Education and Training

• Personnel

• Technology

• Everything that has a price tag

If you justify it, they will pay

Over 1,400 grant programs available

Page 18: Mobile Security Screening May 5, 2010

© 2010 18

Commonly Used Homeland Security Grant

Programs

Page 19: Mobile Security Screening May 5, 2010

© 2010 19

Homeland Security Grant Programs

Homeland Security Grant Program• Urban Area Security Initiative (UASI)

• State Homeland Security Grant Program (SHSGP)

• Metropolitan Medical Response System Program

• Citizen Corps Program

Buffer Zone Protection Program

Port Security Grant Program

Page 20: Mobile Security Screening May 5, 2010

© 2010

Funding Trends FY06-11

20

*Recommended

Note: LETPP rolled into SHSGP for FY08

Page 21: Mobile Security Screening May 5, 2010

© 2010

DHS Grant Release dates FY2010

Grant Release Due date

Homeland Security Grant Program

December 2009 April 19, 2010

Buffer Zone Protection Program

December 2009 February 12, 2010

Operation Stonegarden December 2009 April 19, 2010

Port Security Grant Program

December 2009 February 12, 2010

21

Page 22: Mobile Security Screening May 5, 2010

© 2010 22

Impact of Federal Stimulus

Page 23: Mobile Security Screening May 5, 2010

© 2010

ARRA Objectives for DHS

$2.75 billion allocated to the Department of Homeland Security in ARRA• $715M allocated to state and local programs

Border Security Fencing, Infrastructure, and Technology

Public Transportation and Rail Security Assistance

Firefighter Assistance

Emergency Food and Shelter

Disaster Assistance

Page 24: Mobile Security Screening May 5, 2010

© 2010

DOJ vs. DHS ARRA S&L Funding

24

Source: American Recovery and Reinvestment Act, DHS, DOJ, and INPUT

0 1000 2000 3000 4000 5000

DHS ARRA Funding

DOJ ARRA Funding

715

4,000

US$ (millions)

Page 25: Mobile Security Screening May 5, 2010

© 2010 25

$100 million+

$50 million - $75 million

$75 million - $100 million

$25 million - $50 million

WA

ID

UT

TX

OK

MN

MI

INIL

KY

FL

AL GASC

WV

NY

ME

VA

MS

AR

OH

ND

SD

MT

NV

COKS

AZ

HI

AK

OR

CA

WY

NE IA

WI

PA

MD

DE

NJCT

RI

MA

NH

VT

NM

LA

TN NC

MO

State and local governments will receive $2.3 billion in DOJ/DHS formula grant funding through the ARRA

$0 - $25 million

Sources: Democratic Policy Committee, OVC, and INPUT

DOJ & DHS Formula Grants Allocations

Page 26: Mobile Security Screening May 5, 2010

© 2010 26

Best Practices and Tips for Applying and Using

Grants

Page 27: Mobile Security Screening May 5, 2010

© 2010 27

Best Practices

Do not judge a grant by its title

Your project is importantlook for a variety of funding sources

Keep focusedGoal of project

Outcome of project

“Multi” projects

Grant management

Be realistic, clear, and specific

Page 28: Mobile Security Screening May 5, 2010

© 2010 28

Tips for applying

Get support from local officials

Read over previously awarded applications

Address goalsShort term

Long term

Place the most important information at the top of the application

Editing mistakes can be deadly

MEET DEADLINES!

Page 29: Mobile Security Screening May 5, 2010

© 2010 29

Questions?

Jeff Webster703-707-4081

[email protected]: jwebsterINPUT

Page 30: Mobile Security Screening May 5, 2010

Mobile Security Screening SolutionExecuting Federal Interoperability Standards

Page 31: Mobile Security Screening May 5, 2010

I. Introductions

II. Terminology/Definition of Credentialing & Requirements

III. Credentialing Standards – A Quick History

IV. Overview - Types of Cards - How it all works

V. Demonstration

VI. How does it get paid for?

VII. Recap / Questions?

Page 32: Mobile Security Screening May 5, 2010

Introductions

Salamander Technologies’ Accountability SolutionsSalamander Technologies’ Accountability Solutions provide agencies nationwide with a fully interoperable provide agencies nationwide with a fully interoperable emergency incident command structure based upon NIMS emergency incident command structure based upon NIMS operating procedures. operating procedures. Joseph Robinson, Joseph Robinson, Vice President Marketing & SalesVice President Marketing & Sales

Page 33: Mobile Security Screening May 5, 2010

interTRAX Overview

Page 34: Mobile Security Screening May 5, 2010

Welcome!• What’s your agenda today?• How much do you know about Federal

Interoperability?• What do you hope to take away or learn

from today’s meeting?

Page 35: Mobile Security Screening May 5, 2010

FIPS

PIV-I

PKIIPL

Smart CardLocally Issued Photo ID HSPD-12

FIPS-201

HSPD-5HSPD-5

FRACFRAC

Terminology

Page 36: Mobile Security Screening May 5, 2010

PIV-I -Personal Identification Verification - Interoperability Specs

PKI- Personal Key Infrastructure

IPL- Identity Privilege List

Smart Card – embedded integrated circuit chip

Locally Issued Photo ID – Bar Code to Hold Data – Not PIV-I compatible

HSPD-12 -Policy for a Common Identification Standard for Federal Employees

FIPS/FIPS201- Federal Information Processing Standards

HSPD-5 HSPD-5 – Homeland Security Presidential Directive 5 – Homeland Security Presidential Directive 5

FRACFRAC – First Responder Access Credential – First Responder Access Credential

Terminology – High Level Definitions

Page 37: Mobile Security Screening May 5, 2010

Definition of Credentialing & Requirements

Page 38: Mobile Security Screening May 5, 2010

Credentialing StandardsA Quick History

FIPS/FRAC = PIV-I = Initiative: IntroductionFederal ID for Federal Government WorkersFederal ID for Responders of Federal Disasters

Now Law:

Page 39: Mobile Security Screening May 5, 2010

Credentialing StandardsA Quick History

FIPS/FRAC = PIV-I = Initiative: Introduction

Federal ID for Federal Government WorkersFederal ID for Responders of Federal Disasters

Now Law:

Page 40: Mobile Security Screening May 5, 2010

• 3 Levels of Security • 3 Types of Cards• 3 Types of Agency Issuers3 Types of Agency Issuers

Types of Cards – How it Works

Interoperable vs. Not Interoperable

Page 41: Mobile Security Screening May 5, 2010
Page 42: Mobile Security Screening May 5, 2010

Identification

Page 43: Mobile Security Screening May 5, 2010

IdentificationAt minimum add qualifications which can be validated at the scene without connectivity. This layer of validation is included in the Salamander Accountability system and makes the PIV-I or PIV- C card more useful.

Page 44: Mobile Security Screening May 5, 2010

Incident

Page 45: Mobile Security Screening May 5, 2010

The Goal is to build a platform for issuance and management.

Use the handheld for checking against a known list.

The System can check either at a separate validation station or at a command station.

Page 46: Mobile Security Screening May 5, 2010

The System can check three levels of authentication at the handheld:A.Check the Validation of the Card.B.Check the Validation of the PIN.C.Check the validation of the biometric

Page 47: Mobile Security Screening May 5, 2010

The System can check the list via Cell or wireless or satellite or local Compact dataset on the laptop:A.Check the Validation against Fed,State, local lists.B.We sell a hub application called interTRAX exchange for this purpose and could mix it with an Fed list provider.

Page 48: Mobile Security Screening May 5, 2010

It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.

There are Three places to validate cards.

Handheld validation using three factor authentication.

Laptop validation of the all the layers of authority including Fed List.

Command validation of the all the layers of authority including Fed Lists.

Page 49: Mobile Security Screening May 5, 2010

It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.

There are Three places to validate cards.

Handheld validation using three factor authentication.

rapidTAG validation of the all the layers of authority including OCSP.

Command validation of the all the layers of authority including OCSP.

Page 50: Mobile Security Screening May 5, 2010

It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.

There are Three places to validate cards

Handheld validation using three factor authentication.

rapidTAG validation of the all the layers of authority including OCSP.

Command validation of the all the layers of authority including OCSP.

Page 51: Mobile Security Screening May 5, 2010

It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.

There are Three places to validate cards.

Handheld validation using three factor authentication.

rapidTAG validation of the all the layers of authority including OCSP.

Command validation of the all the layers of authority including OCSP.

Page 52: Mobile Security Screening May 5, 2010

Interoperability

• Strong Identity Vetting from Trusted Sources

• Off Card KSAs to allow dynamic, local management of that

information

• Electronic Validation of Identity and KSAs

• Ability to share this information across agencies, State to State,

Fed to State, …

• Functionality in Lights-Out / Comms-Out

• Leverage existing standards and success

Page 53: Mobile Security Screening May 5, 2010

Interoperability

ID &

Priv.

Identity & Privilege Lists

Lessons Learned

-Identity is Static- Long Lived Identity Credential- FIPS201

-Abilities are Dynamic- Can be updated without touching the card

- Identity and Privilege List-Combines the Strength of a Strong Identity with the most current skills that can be electronically verified as current, valid, and from a trusted source

Certificate & Identity Issuing Authorities

First ResponderKnowledge, Skills & Abilities

Privilege Databases

Page 54: Mobile Security Screening May 5, 2010

Interoperability

FEMA

Repository

IPL

Management Station (s)Locally Deployed

Comm. Of PA

IPL

National Guard (DoD)

IPL

Other States

& Fed Agencies

TWIC, CAC, FRAC

IPL

State of CO

CO Bridge

IPL

Interoperability

Page 55: Mobile Security Screening May 5, 2010

So, what makes for a successful credentialing effort?

or

What’s Program Management got to do with it?

Page 56: Mobile Security Screening May 5, 2010

Who gets what card?Who Gets Credentialed?

Who Delivers them?

Who Revokes them?

Why can they be revoked?

How are they distributed?How are they renewed?

What if someone is denied?

What’s the card look like?

Where is the system housed?

Page 57: Mobile Security Screening May 5, 2010

Product Evolution: PIV/Accountability Schematic

57 Integrated model has received tacit endorsement from the Feds (DHS)

•TWIC Port Security•Military Base Security – Lowry Solution•Mutual Aide Validation•Visitor Management•Hot-list Management•Education (K-12, Higher Ed)

•Security•Student Mgmt•Incident Mgmt

•Medical•POD Mgmt•Pre-Hospital Patient Tracking•Incident Mgmt•Evacuation Mgmt

•Muster•Manifest•Chain-of-Custody

Page 58: Mobile Security Screening May 5, 2010

MOBILE Data Collector

EMS Tabw/ Drivers License Read

Identity Validation

-- MOBILE PIV -- -- MOBILE ICS -- -- MOBILE EMS --

Page 59: Mobile Security Screening May 5, 2010

COMMAND• Scene Management

– Who is Where?– Muster Points– Accountability

• Security Management– RFID Based, Barcode, Smartcard (PIV)– Strong Security Model with Hotlist Management

• Physical Security & Accountability in one Identity• Life Safety and Security with one Application

– Possible Integration with Door Access Control?

Page 60: Mobile Security Screening May 5, 2010

COMMAND

Page 61: Mobile Security Screening May 5, 2010

Thank You!

Page 62: Mobile Security Screening May 5, 2010