mobile security screening may 5, 2010
DESCRIPTION
Mobile Security Screening May 5, 2010. Presenters: Peggy Lane, BlueStar [email protected] Jeff Webster, INPUT [email protected] - Joseph Robinson, Salamander Technologies [email protected]. BlueStar’s Government Initiative. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/1.jpg)
![Page 2: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/2.jpg)
Presenters:- Peggy Lane, [email protected] Jeff Webster, [email protected] Joseph Robinson, Salamander [email protected]
![Page 3: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/3.jpg)
• BlueStars Government initiative was created for resellers who currently sell into government, as well as for those interested in developing new government business.
•Demand Generation•Educational Seminars and Webinars•ISV Solutions Development and Teaming•Grant Writing•Municipal Leasing
![Page 4: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/4.jpg)
• Plan your market strategy• Partners need to determine the size of your market opportunity and define your
short and long term government business strategies and goals. BlueStars expertise strategic planning, government procurement, will grow your business
• Define your Sales Territories and Educate your Team• Having a highly skilled and knowledgeable team selling to the right customer at the
right time makes the difference between bidding… and bidding and winning. • Develop and Grow your Government Pipeline• Creating a qualified pipeline is critical to accurately forecast revenue and make
informed bid decisions. BlueStar has the resources you need to build a winning pipeline.
• Develop Winning Proposals• Pursuing bid opportunities with an understanding of your government prospect’s
pain-points and objectives means viewing the bid opportunity from their perspective.
![Page 5: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/5.jpg)
• E-Citation and Code Enforcement• First Responder Accountability• Security Screening Mobile Data Access• Inspections and Maintenance• Asset Management
Motorola Government Application Segments
![Page 6: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/6.jpg)
• Government Opportunities - Get the latest on the opportunities you choose to track • Agency Information - Access opportunities, contracts, news, and more for agencies
of interest to you • States - Access opportunities, contracts, news, and more for states of interest to you • Local Governments - Access opportunities, contracts, news, and more for local
governments of interest to you • Companies - Up-to-date news and awards for competitors and partners you follow • Grants - Receive easy access to your marked grant programs and awards • Task Orders - Stay up-to-date on the task orders you are interested in
BlueStar Bid Opportunities and Industry Information
![Page 7: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/7.jpg)
• Educational series for our partners to understand purchasing and funding cycles for Federal, State and Local Government.
• Vertical focused: Education, Public Safety, First Responder’s, Health etc..
Motorola Government 101 Grants 101 Webinar Series
![Page 8: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/8.jpg)
![Page 9: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/9.jpg)
Deliver Solution
BlueStar ISV Partnerships:
BlueStar Inc. is closely aligned with a select network of strategic ISV partners offering unique and customizable vertical solutions for Public Safety, State & Local Government, Industrial, Commercial, RFID and Retail market segments. We understand the need to build new solution sets that will allow you to grow your business in today's competitive markets
![Page 10: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/10.jpg)
• Creative financing and leasing options for our Partners who sell
into the public sector.
• Our technology distribution expertise and focus in providing technology solutions to State and Local governments, affords us a thorough understanding into the unique financial and budgetary needs that the public sector requires.
• BlueStar offers multiple options of Municipal Leasing and allows
our resellers to tailor specific lease structures for the distinct requirements of government entities.
![Page 12: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/12.jpg)
© 2010
State and Local Public Safety/Homeland Security Grants
Jeff WebsterSenior Analyst, Justice/Public Safety & Homeland SecurityINPUT
May 5, 2010
![Page 13: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/13.jpg)
© 2010
Agenda
13
Grant process
Finding Grants and using them
Commonly used Homeland Security grant programs for asset and evidence management
Stimulus
Best practices and tips
![Page 14: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/14.jpg)
© 2010
Grant Classifications & Sources of Information
14
How does the federal grant process work?
Grant Classifications• Direct
• Pass-Through
Further Classifications• Competitive
• Formula
Sources of Grant Information• INPUT’s Grants Database• Grants.gov• Federal Register• Monthly Treasury Statements fo
r Grants Funding• Catalog of Federal Domestic As
sistance
![Page 15: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/15.jpg)
© 2010 15
Finding Grants and Using Them
![Page 16: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/16.jpg)
© 2010 16
Finding Grants
Grants are published in the Catalog of Federal Domestic Assistance (CFDA)• Search by Keyword
• Search by Program Number
• CFDA.gov
Grants.gov
FEMA Preparedness Grant• Search grant programs by equipment type
![Page 17: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/17.jpg)
© 2010 17
Utilizing Grants
Agencies utilize grant funds for the following:• Equipment
• Education and Training
• Personnel
• Technology
• Everything that has a price tag
If you justify it, they will pay
Over 1,400 grant programs available
![Page 18: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/18.jpg)
© 2010 18
Commonly Used Homeland Security Grant
Programs
![Page 19: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/19.jpg)
© 2010 19
Homeland Security Grant Programs
Homeland Security Grant Program• Urban Area Security Initiative (UASI)
• State Homeland Security Grant Program (SHSGP)
• Metropolitan Medical Response System Program
• Citizen Corps Program
Buffer Zone Protection Program
Port Security Grant Program
![Page 20: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/20.jpg)
© 2010
Funding Trends FY06-11
20
*Recommended
Note: LETPP rolled into SHSGP for FY08
![Page 21: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/21.jpg)
© 2010
DHS Grant Release dates FY2010
Grant Release Due date
Homeland Security Grant Program
December 2009 April 19, 2010
Buffer Zone Protection Program
December 2009 February 12, 2010
Operation Stonegarden December 2009 April 19, 2010
Port Security Grant Program
December 2009 February 12, 2010
21
![Page 22: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/22.jpg)
© 2010 22
Impact of Federal Stimulus
![Page 23: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/23.jpg)
© 2010
ARRA Objectives for DHS
$2.75 billion allocated to the Department of Homeland Security in ARRA• $715M allocated to state and local programs
Border Security Fencing, Infrastructure, and Technology
Public Transportation and Rail Security Assistance
Firefighter Assistance
Emergency Food and Shelter
Disaster Assistance
![Page 24: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/24.jpg)
© 2010
DOJ vs. DHS ARRA S&L Funding
24
Source: American Recovery and Reinvestment Act, DHS, DOJ, and INPUT
0 1000 2000 3000 4000 5000
DHS ARRA Funding
DOJ ARRA Funding
715
4,000
US$ (millions)
![Page 25: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/25.jpg)
© 2010 25
$100 million+
$50 million - $75 million
$75 million - $100 million
$25 million - $50 million
WA
ID
UT
TX
OK
MN
MI
INIL
KY
FL
AL GASC
WV
NY
ME
VA
MS
AR
OH
ND
SD
MT
NV
COKS
AZ
HI
AK
OR
CA
WY
NE IA
WI
PA
MD
DE
NJCT
RI
MA
NH
VT
NM
LA
TN NC
MO
State and local governments will receive $2.3 billion in DOJ/DHS formula grant funding through the ARRA
$0 - $25 million
Sources: Democratic Policy Committee, OVC, and INPUT
DOJ & DHS Formula Grants Allocations
![Page 26: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/26.jpg)
© 2010 26
Best Practices and Tips for Applying and Using
Grants
![Page 27: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/27.jpg)
© 2010 27
Best Practices
Do not judge a grant by its title
Your project is importantlook for a variety of funding sources
Keep focusedGoal of project
Outcome of project
“Multi” projects
Grant management
Be realistic, clear, and specific
![Page 28: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/28.jpg)
© 2010 28
Tips for applying
Get support from local officials
Read over previously awarded applications
Address goalsShort term
Long term
Place the most important information at the top of the application
Editing mistakes can be deadly
MEET DEADLINES!
![Page 30: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/30.jpg)
Mobile Security Screening SolutionExecuting Federal Interoperability Standards
![Page 31: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/31.jpg)
I. Introductions
II. Terminology/Definition of Credentialing & Requirements
III. Credentialing Standards – A Quick History
IV. Overview - Types of Cards - How it all works
V. Demonstration
VI. How does it get paid for?
VII. Recap / Questions?
![Page 32: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/32.jpg)
Introductions
Salamander Technologies’ Accountability SolutionsSalamander Technologies’ Accountability Solutions provide agencies nationwide with a fully interoperable provide agencies nationwide with a fully interoperable emergency incident command structure based upon NIMS emergency incident command structure based upon NIMS operating procedures. operating procedures. Joseph Robinson, Joseph Robinson, Vice President Marketing & SalesVice President Marketing & Sales
![Page 33: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/33.jpg)
interTRAX Overview
![Page 34: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/34.jpg)
Welcome!• What’s your agenda today?• How much do you know about Federal
Interoperability?• What do you hope to take away or learn
from today’s meeting?
![Page 35: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/35.jpg)
FIPS
PIV-I
PKIIPL
Smart CardLocally Issued Photo ID HSPD-12
FIPS-201
HSPD-5HSPD-5
FRACFRAC
Terminology
![Page 36: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/36.jpg)
PIV-I -Personal Identification Verification - Interoperability Specs
PKI- Personal Key Infrastructure
IPL- Identity Privilege List
Smart Card – embedded integrated circuit chip
Locally Issued Photo ID – Bar Code to Hold Data – Not PIV-I compatible
HSPD-12 -Policy for a Common Identification Standard for Federal Employees
FIPS/FIPS201- Federal Information Processing Standards
HSPD-5 HSPD-5 – Homeland Security Presidential Directive 5 – Homeland Security Presidential Directive 5
FRACFRAC – First Responder Access Credential – First Responder Access Credential
Terminology – High Level Definitions
![Page 37: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/37.jpg)
Definition of Credentialing & Requirements
![Page 38: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/38.jpg)
Credentialing StandardsA Quick History
FIPS/FRAC = PIV-I = Initiative: IntroductionFederal ID for Federal Government WorkersFederal ID for Responders of Federal Disasters
Now Law:
![Page 39: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/39.jpg)
Credentialing StandardsA Quick History
FIPS/FRAC = PIV-I = Initiative: Introduction
Federal ID for Federal Government WorkersFederal ID for Responders of Federal Disasters
Now Law:
![Page 40: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/40.jpg)
• 3 Levels of Security • 3 Types of Cards• 3 Types of Agency Issuers3 Types of Agency Issuers
Types of Cards – How it Works
Interoperable vs. Not Interoperable
![Page 41: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/41.jpg)
![Page 42: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/42.jpg)
Identification
![Page 43: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/43.jpg)
IdentificationAt minimum add qualifications which can be validated at the scene without connectivity. This layer of validation is included in the Salamander Accountability system and makes the PIV-I or PIV- C card more useful.
![Page 44: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/44.jpg)
Incident
![Page 45: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/45.jpg)
The Goal is to build a platform for issuance and management.
Use the handheld for checking against a known list.
The System can check either at a separate validation station or at a command station.
![Page 46: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/46.jpg)
The System can check three levels of authentication at the handheld:A.Check the Validation of the Card.B.Check the Validation of the PIN.C.Check the validation of the biometric
![Page 47: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/47.jpg)
The System can check the list via Cell or wireless or satellite or local Compact dataset on the laptop:A.Check the Validation against Fed,State, local lists.B.We sell a hub application called interTRAX exchange for this purpose and could mix it with an Fed list provider.
![Page 48: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/48.jpg)
It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.
There are Three places to validate cards.
Handheld validation using three factor authentication.
Laptop validation of the all the layers of authority including Fed List.
Command validation of the all the layers of authority including Fed Lists.
![Page 49: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/49.jpg)
It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.
There are Three places to validate cards.
Handheld validation using three factor authentication.
rapidTAG validation of the all the layers of authority including OCSP.
Command validation of the all the layers of authority including OCSP.
![Page 50: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/50.jpg)
It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.
There are Three places to validate cards
Handheld validation using three factor authentication.
rapidTAG validation of the all the layers of authority including OCSP.
Command validation of the all the layers of authority including OCSP.
![Page 51: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/51.jpg)
It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.
There are Three places to validate cards.
Handheld validation using three factor authentication.
rapidTAG validation of the all the layers of authority including OCSP.
Command validation of the all the layers of authority including OCSP.
![Page 52: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/52.jpg)
Interoperability
• Strong Identity Vetting from Trusted Sources
• Off Card KSAs to allow dynamic, local management of that
information
• Electronic Validation of Identity and KSAs
• Ability to share this information across agencies, State to State,
Fed to State, …
• Functionality in Lights-Out / Comms-Out
• Leverage existing standards and success
![Page 53: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/53.jpg)
Interoperability
ID &
Priv.
Identity & Privilege Lists
Lessons Learned
-Identity is Static- Long Lived Identity Credential- FIPS201
-Abilities are Dynamic- Can be updated without touching the card
- Identity and Privilege List-Combines the Strength of a Strong Identity with the most current skills that can be electronically verified as current, valid, and from a trusted source
Certificate & Identity Issuing Authorities
First ResponderKnowledge, Skills & Abilities
Privilege Databases
![Page 54: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/54.jpg)
Interoperability
FEMA
Repository
IPL
Management Station (s)Locally Deployed
Comm. Of PA
IPL
National Guard (DoD)
IPL
Other States
& Fed Agencies
TWIC, CAC, FRAC
IPL
State of CO
CO Bridge
IPL
Interoperability
![Page 55: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/55.jpg)
So, what makes for a successful credentialing effort?
or
What’s Program Management got to do with it?
![Page 56: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/56.jpg)
Who gets what card?Who Gets Credentialed?
Who Delivers them?
Who Revokes them?
Why can they be revoked?
How are they distributed?How are they renewed?
What if someone is denied?
What’s the card look like?
Where is the system housed?
![Page 57: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/57.jpg)
Product Evolution: PIV/Accountability Schematic
57 Integrated model has received tacit endorsement from the Feds (DHS)
•TWIC Port Security•Military Base Security – Lowry Solution•Mutual Aide Validation•Visitor Management•Hot-list Management•Education (K-12, Higher Ed)
•Security•Student Mgmt•Incident Mgmt
•Medical•POD Mgmt•Pre-Hospital Patient Tracking•Incident Mgmt•Evacuation Mgmt
•Muster•Manifest•Chain-of-Custody
![Page 58: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/58.jpg)
MOBILE Data Collector
EMS Tabw/ Drivers License Read
Identity Validation
-- MOBILE PIV -- -- MOBILE ICS -- -- MOBILE EMS --
![Page 59: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/59.jpg)
COMMAND• Scene Management
– Who is Where?– Muster Points– Accountability
• Security Management– RFID Based, Barcode, Smartcard (PIV)– Strong Security Model with Hotlist Management
• Physical Security & Accountability in one Identity• Life Safety and Security with one Application
– Possible Integration with Door Access Control?
![Page 60: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/60.jpg)
COMMAND
![Page 61: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/61.jpg)
Thank You!
![Page 62: Mobile Security Screening May 5, 2010](https://reader035.vdocument.in/reader035/viewer/2022062518/56814806550346895db5368c/html5/thumbnails/62.jpg)