SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Connect & Protect – an advanced safety
 and security information service for
      government and industry
                   Peter Eriksson, Patrik Stridh
       1Future Position X, Box 975, Gävle, 80133, Sweden
            Tel: +46 026 61 44 00, Email: info@fpx.se
        2Organisation, Address, City, Postcode., Country

       Tel: +4670 638 9594 , Email: peter.eriksson@fpx.se
.

1. Introduction – Connect & Protect
1   Key words: Security, Information sharing, communities of trust, emergency
    management, intelligence, Web 2.0

2   Experiences from disasters and emergencies show that one of the major challenges to
    managing an incident or emergency event is efficient sharing of information across
    organizations. Failure to target proper information to the right recipient in time may
    result in damage of property and, worst case, losses of lives. Being able to not only
    share common operating pictures, but also enabling professionals to create and share
    their own “personal” operating picture based on their role and field of responsibility
    (and related information needs), supports making more informed decisions,
    collaboration across organizations and efficient use of resources.

3   Over the past two years, Future Position X has coordinated a program in Sweden to
    support improved collaboration related to emergency events and threats at both local,
    national and international level.

4   This paper will provide experiences from both the local level, with participation from
    fire services, hospital and ambulance services, local government, county administration,
    and the national level with a number of government agencies. Particular focus has been
    placed on mobility.

5   The program is based on Connect & Protect, a web-based information sharing service to
    help organizations stay better informed of late-breaking threats and events and
    becoming more resilient. The service supports intelligence gathering and creation and
    sharing of common operating pictures by fusing various automated and manual online
    data feeds. Such data feeds may be ranging from global to domestic sources and
    spanning areas like natural disasters, accidents, terrorist acts, traffic incidents, weather,
    critical infrastructure disturbances, news etc. The platform is scalable from local to
    regional to national to international level. The Connect & Protect service supplies this
    information in a secure and trusted manner, where authorized users can set up
    communities to share sensitive and critical information during crises to enhance
    interorganisational collaboration.
2. Objectives

1. To be a national system for information sharing cross organizations.

2. To be a international system for information sharing cross organizations.

3. Extend the reach of vital, life-saving, real-time emergency information to emergencie
   first responders, community safety stakeholders, such as schools, hospitals, large
   employers, et al.
4. Increase information sharing between public and private sectors for increased public
   safety.

5. Lower communications costs through the use of a highly automated functions fore
   information sharing and dissemination.


3. Methodology
The national project has been a very hands-on proof-of-concept project, where the initial
objective was to test if the experiences from the 911 centrals could be implemented in a
Swedish context. The project group has consisted of representatives from 10 national
government agencies. Much of the initial work consisted of information mapping to decide
suitable sources for integration. Common priorities have been made through a number of
joint workshops, followed up by implementation and testing (both in the field and in
command stations). This has been continuously ongoing throughout the entire project. One
of the biggest challenges has been to see how Swedish laws support information sharing
across organization through the communities of trust model. The absolute strength of the
service is that it lets the content owner administrate its information resources. They thereby
decide and control their own information and who should have access to the information.
That has been the absolute number one key benefit! One critical aspect involves identifying
information hierarchies to support establishment and different levels of information sharing
through communities of trust.
6. Technology Description
The service has been designed to support four main objectives:

7. Access to aggregated, time-critical information as decision support
   •   Facilitate information gathering from many different sources by combining and
       visualising data through a unified, easy-to use configurable interface
   •   Aggregate information based on subject or event, to enable users to quickly interpret
       and identify important related information, i e “connect the dots”.
   •   Deliver alerts and notifications adjusted to each recipients profile and preferences,
       using filters such as subject, alert level, time or geography.
   •   Support common operating awareness by integrated geographic information
   •   Enable alerting and notification through various media incl PC and mobile units.
   •   Dynamically extend the number of persons and functions given access to correct
       information on time.

8. Create and manage work groups and information rights (a k a ”Communities of Trust”)
   for information exchange between trusted members in a workgroup
   •   Structure AND flexibility; authorized members in a work group can securely share
       sensitive information within predefined (e g harbor security) work groups or
       temporarily created work groups (e g Avian flue outbreak) spanning across
       organizational boundaries
   •   Support management of work groups; such as inviting and authorizing new
       members, enforce policies and rules, configure content, provide check-lists,
       supportive information etc
   •   Manage and create “sub-groups”, to meet the need for different levels of
       authorization within a community.

9. Simple and efficient information exchange for speed and user friendliness
   •   Support automated alerting, with immediate notification to each authorized recipient
   •   Enable users to filter information flows based on their needs reducing irrelevant
       information ”overflow”.
   •   Provide access to critical information from any web-connected computer or mobile
       cell phone across the world.
   •   Simplify access and integration of webb-based information sources; by using web
       services 2.0 and other standards, such as the Common Alerting Protocol (CAP).

10. Standardised security to create trust and secure transfer of sensitive information
   •   Full tractability on all system activity, inkl who took part of information
•   Password-based authentication and access
   •   Authorization based on security level at end-user
   •   Encrypted transfer

Since Connect & Protect is built on a service-oriented systems architecture, it is easy to
integrate new data sources, given that these are specified in a unified manner. A number of
local and national Swedish information feeds have been integrated, such as 112 alerts,
weather, map services, web cams etc. All RSS-feeds are supported

11. TIES Architecture
13. TIES Overview
Actionable mission-critical information where and when you need it.

TIES is a Web 2.0 information sharing service used by public and private Communities of Trust
concerned with security risks, supply chain bottlenecks, brand compromise, and more. TIES
delivers:
   •   Up-to-the-minute critical information from thousands of sources: open source, commercial
       and government-restricted
   •   Customized and configurable dashboards for relevance to you
   •   Layered “operational pictures” for any and all enterprise functions
   •   Community of Trust management
   •   Advanced, policy-driven targeting and filtering




As part of the TIES system, TIES Mobile provides secure, location-aware two-way alerting.
With support for both standard browser and Windows Mobile platforms, TIES Mobile
drives real-time alerts and maps to Blackberry, iPhone, Windows Mobile 5/6 devices. TIES
Mobile delivers:

   •   Field-based alert creation with multi-media support (image, video and audio)

   •   Continuous tracking of mobile users or assets (e.g. Executive Protection)

   •   Dynamic alert mapping

   •   GPS tracking

   •   Secure, audited transactions


14. TIES Mobile Overview
Mission-critical information for situational awareness, safety and risk management—
wherever you are. As part of the TIES system, TIES Mobile displays real-time safety,
security and risk management data consolidated from many sources directly to a mobile
device. Engineered specifically for ease of use, TIES Mobile provides secure locationally
aware two-way alerting.

   •   Displays TIES-filtered alerts near your current location

   •   Lets you create alerts in the field and upload into the TIES system—capture alert
       details, location, pictures

   •   Dynamic alert mapping




15.Results
Government Credentials
  •2008: Operation Golden Phoenix '08

   •2008: Controlled Unclassified Information (CUI)

   •2006–2007: Spirals 1 and 2, Last Mile Intelligence Techniques (LMIT) program,
      Office of the Director of National Intelligence (ODNI)

   •2006: Information Sharing Cooperative Research and Development Agreement
      (CRADA) with NSA’s Information Assurance Directorate

   •2006: Synthetic Cities, Joint Forces Command, Dept of Defence
•2004: Joint Warfighter Interoperability Demonstration, NORTHCOM

   •2003–present: Connect & Protect, City of Portland, Multnomah County, State of
      Oregon, et. Al

   •2004-05: LA RECON (Louisiana Emergency Command Operations Network), Dept of
      Defence Homeland Security and Defence Command and Control Advanced Concept
      Technology Demonstration (HLS/D C2 ACTD)

   •2003-04: TRANSEC-Net, a 22-port Information Sharing Pilot, TSA, Dept of
      Homeland Security

   •2002-2005: Homeland Security and Defence Command and Control Advanced
      Concept Technology Demonstration (HLS C2 ACTD) Dept of Defence.

Awards and Recognition
  •2006: The CRADA between Swan Island Networks and the NSA/IAD is the subject of
     a two-part information sharing political analysis published in the Washington Times

   •2005: Wired Magazine publishes a story about Connect & Protect (an information
      sharing service based on Swan Island Networks' technology) describing it as a
      “radical breakthrough” in emergency management

   •2005: Swan Island Networks’ CEO wins Federal Computer Week 16th annual Federal
      100 Award

   •2004: Connect & Protect is a finalist for the Homeland Security Innovation of the Year,
      given by the Ash Institute at Harvard’s John F. Kennedy School of Government

   •2004: Swan Island Networks’ flagship SWARM technology wins Top Ten Performer
      Award, Joint Warfighter Interoperability Demonstration

   •2003: Swan Island Networks’ CEO speaks at a US Chamber of Commerce conference,
      “The National Response Plan: Implications for Government, Non-Profit and Private
      Sector Disaster Coordination”

16.Business Benefits
   •Managed Services: Low-cost, agile commercial-off-the-shelf information services are
     quickly replacing expensive proprietary systems.

   •Agile Mashups: New Web 2.0-style geospatial systems are dynamically fusing
      together a variety of information sources—and providing flexible new views of
      changing conditions, in real-time.

   •Communities of Trust: Requirements for cross-agency, cross-jurisdiction information
      sharing services are met with new community-based information access models.
17.Conclusions

A number of incidents and events, like the tsunami and various storms over the past years,
clearly show the need for collaboration between government agencies to manage
unexpected events and threats to society. Various initiatives have been made to facilitate
this, including organisational changes, methods and technological development. Many
organisations have developed their own command and control systems and in some cases
exchange information with other agencies, but usually through “stovepipes”. Many
organisations do however still lack application support for gathering information and
sharing this with others in a secure manner. Getting organisations to collaborate in
information sharing to support intelligence gathering and operational work is to a large
degree a matter of mindset. Such projects do take time. Building trust is a key factor, where
each information owner has concerns about the control and full ownership of his/her
information and wh has access to this. Using a community structure similar to what has
been implemented in Connect & Protect, this hurdle can be overcome.

Conclusions from the project are that such a system as Connect & Protect can be
implemented in a Swedish context within existing organisational framework. The project
shows that there is a need for collaborative solutions that support sharing of emergency-
related information across organisations. Development and use of standards for messaging,
data feeds like RSS and geospatial mapping for publishing information is vital, and many of
the involved agencies admit they need to review their existing information structures as
their specific information is often “locked” into stovepipe applications. As the number of
information resources grow exponentially and become available through various media and
news services, there is an increasing need to provide access to various sources through a
common interface. This enables forming a common operating picture across organisations
and yet allows for flexibility to customise information views based on each users/
organisations needs and responsibilities. Empowering each information owner to control
their own information and who has access to it is vital to the success of collaborative efforts
in forming common operating pictures and sharing that information with others.

References
[1]
[2]
[3]

Más contenido relacionado

La actualidad más candente

Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Joshua L. Davis
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange ModelDavid Fletcher
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsChuck Brooks
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)brentcarey
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceRightPatient®
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsAlfonso Sintjago
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisIJERD Editor
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) PwC France
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Povo News
 

La actualidad más candente (19)

Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
 
National Information Exchange Model
National Information Exchange ModelNational Information Exchange Model
National Information Exchange Model
 
Gsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awardsGsn 2014 digital yearbook of homeland security awards
Gsn 2014 digital yearbook of homeland security awards
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
 
CIP eu 2016 114(-8)
CIP eu 2016 114(-8)CIP eu 2016 114(-8)
CIP eu 2016 114(-8)
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
D372326.pdf
D372326.pdfD372326.pdf
D372326.pdf
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011) Etude sur le marché de la cyber sécurité (2011)
Etude sur le marché de la cyber sécurité (2011)
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017
 

Similar a Connect And Protect

Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Unisys Corporation
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management responseJack Brown
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationmikeecholscyber
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureAnn Treacy
 
Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11jcontestabile
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)Santosh Khadsare
 
WSO2Con USA 2017: A Semantic and Ontology Informational Data Model
WSO2Con USA 2017: A Semantic and Ontology Informational Data ModelWSO2Con USA 2017: A Semantic and Ontology Informational Data Model
WSO2Con USA 2017: A Semantic and Ontology Informational Data ModelWSO2
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentVidSys, Inc.
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Ageglobal
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaSyed Peer
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageCitrix
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 

Similar a Connect And Protect (20)

AtHocProductBrochure_V2
AtHocProductBrochure_V2AtHocProductBrochure_V2
AtHocProductBrochure_V2
 
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
Never Compromise Your Mission: 5 Ways to Strengthen Data and Network Security...
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
News letter oct 12
News letter oct 12News letter oct 12
News letter oct 12
 
InSTEDD Mesh4x Platform
InSTEDD Mesh4x PlatformInSTEDD Mesh4x Platform
InSTEDD Mesh4x Platform
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 
Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
WSO2Con USA 2017: A Semantic and Ontology Informational Data Model
WSO2Con USA 2017: A Semantic and Ontology Informational Data ModelWSO2Con USA 2017: A Semantic and Ontology Informational Data Model
WSO2Con USA 2017: A Semantic and Ontology Informational Data Model
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Manage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usageManage risk by protecting apps, data and usage
Manage risk by protecting apps, data and usage
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 

Más de Future Position X (20)

Made in Sweden
Made in SwedenMade in Sweden
Made in Sweden
 
Press Kina 100412
Press Kina 100412Press Kina 100412
Press Kina 100412
 
Fpx Poster English Low
Fpx Poster English LowFpx Poster English Low
Fpx Poster English Low
 
FPX Clusterstory 10
FPX Clusterstory 10FPX Clusterstory 10
FPX Clusterstory 10
 
FPX Clusterstory 7
FPX Clusterstory 7FPX Clusterstory 7
FPX Clusterstory 7
 
FPX Clusterstory 8
FPX Clusterstory 8FPX Clusterstory 8
FPX Clusterstory 8
 
FPX Clusterstory 9
FPX Clusterstory 9FPX Clusterstory 9
FPX Clusterstory 9
 
FPX Clusterstory 2
FPX Clusterstory 2FPX Clusterstory 2
FPX Clusterstory 2
 
FPX Clusterstory 3
FPX Clusterstory 3FPX Clusterstory 3
FPX Clusterstory 3
 
FPX Clusterstory 6
FPX Clusterstory 6FPX Clusterstory 6
FPX Clusterstory 6
 
FPX Clusterstory 5
FPX Clusterstory 5FPX Clusterstory 5
FPX Clusterstory 5
 
FPX Clusterstory 4
FPX Clusterstory 4FPX Clusterstory 4
FPX Clusterstory 4
 
FPX Clusterstory 1
FPX Clusterstory 1FPX Clusterstory 1
FPX Clusterstory 1
 
Pressinfo Kina100212
Pressinfo Kina100212Pressinfo Kina100212
Pressinfo Kina100212
 
Pressinbjudankina100212
Pressinbjudankina100212Pressinbjudankina100212
Pressinbjudankina100212
 
Inbjudan Testseminarium 16 Mars 2010
Inbjudan Testseminarium 16 Mars 2010Inbjudan Testseminarium 16 Mars 2010
Inbjudan Testseminarium 16 Mars 2010
 
Point2point
Point2pointPoint2point
Point2point
 
Chinese FPX info
Chinese FPX infoChinese FPX info
Chinese FPX info
 
ChineseHiG
ChineseHiGChineseHiG
ChineseHiG
 
GIS Arena
GIS ArenaGIS Arena
GIS Arena
 

Último

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Connect And Protect

  • 1. Connect & Protect – an advanced safety and security information service for government and industry Peter Eriksson, Patrik Stridh 1Future Position X, Box 975, Gävle, 80133, Sweden Tel: +46 026 61 44 00, Email: info@fpx.se 2Organisation, Address, City, Postcode., Country Tel: +4670 638 9594 , Email: peter.eriksson@fpx.se
  • 2. . 1. Introduction – Connect & Protect 1 Key words: Security, Information sharing, communities of trust, emergency management, intelligence, Web 2.0 2 Experiences from disasters and emergencies show that one of the major challenges to managing an incident or emergency event is efficient sharing of information across organizations. Failure to target proper information to the right recipient in time may result in damage of property and, worst case, losses of lives. Being able to not only share common operating pictures, but also enabling professionals to create and share their own “personal” operating picture based on their role and field of responsibility (and related information needs), supports making more informed decisions, collaboration across organizations and efficient use of resources. 3 Over the past two years, Future Position X has coordinated a program in Sweden to support improved collaboration related to emergency events and threats at both local, national and international level. 4 This paper will provide experiences from both the local level, with participation from fire services, hospital and ambulance services, local government, county administration, and the national level with a number of government agencies. Particular focus has been placed on mobility. 5 The program is based on Connect & Protect, a web-based information sharing service to help organizations stay better informed of late-breaking threats and events and becoming more resilient. The service supports intelligence gathering and creation and sharing of common operating pictures by fusing various automated and manual online data feeds. Such data feeds may be ranging from global to domestic sources and spanning areas like natural disasters, accidents, terrorist acts, traffic incidents, weather, critical infrastructure disturbances, news etc. The platform is scalable from local to regional to national to international level. The Connect & Protect service supplies this information in a secure and trusted manner, where authorized users can set up communities to share sensitive and critical information during crises to enhance interorganisational collaboration.
  • 3. 2. Objectives 1. To be a national system for information sharing cross organizations. 2. To be a international system for information sharing cross organizations. 3. Extend the reach of vital, life-saving, real-time emergency information to emergencie first responders, community safety stakeholders, such as schools, hospitals, large employers, et al. 4. Increase information sharing between public and private sectors for increased public safety. 5. Lower communications costs through the use of a highly automated functions fore information sharing and dissemination. 3. Methodology The national project has been a very hands-on proof-of-concept project, where the initial objective was to test if the experiences from the 911 centrals could be implemented in a Swedish context. The project group has consisted of representatives from 10 national government agencies. Much of the initial work consisted of information mapping to decide suitable sources for integration. Common priorities have been made through a number of joint workshops, followed up by implementation and testing (both in the field and in command stations). This has been continuously ongoing throughout the entire project. One of the biggest challenges has been to see how Swedish laws support information sharing across organization through the communities of trust model. The absolute strength of the service is that it lets the content owner administrate its information resources. They thereby decide and control their own information and who should have access to the information. That has been the absolute number one key benefit! One critical aspect involves identifying information hierarchies to support establishment and different levels of information sharing through communities of trust.
  • 4. 6. Technology Description The service has been designed to support four main objectives: 7. Access to aggregated, time-critical information as decision support • Facilitate information gathering from many different sources by combining and visualising data through a unified, easy-to use configurable interface • Aggregate information based on subject or event, to enable users to quickly interpret and identify important related information, i e “connect the dots”. • Deliver alerts and notifications adjusted to each recipients profile and preferences, using filters such as subject, alert level, time or geography. • Support common operating awareness by integrated geographic information • Enable alerting and notification through various media incl PC and mobile units. • Dynamically extend the number of persons and functions given access to correct information on time. 8. Create and manage work groups and information rights (a k a ”Communities of Trust”) for information exchange between trusted members in a workgroup • Structure AND flexibility; authorized members in a work group can securely share sensitive information within predefined (e g harbor security) work groups or temporarily created work groups (e g Avian flue outbreak) spanning across organizational boundaries • Support management of work groups; such as inviting and authorizing new members, enforce policies and rules, configure content, provide check-lists, supportive information etc • Manage and create “sub-groups”, to meet the need for different levels of authorization within a community. 9. Simple and efficient information exchange for speed and user friendliness • Support automated alerting, with immediate notification to each authorized recipient • Enable users to filter information flows based on their needs reducing irrelevant information ”overflow”. • Provide access to critical information from any web-connected computer or mobile cell phone across the world. • Simplify access and integration of webb-based information sources; by using web services 2.0 and other standards, such as the Common Alerting Protocol (CAP). 10. Standardised security to create trust and secure transfer of sensitive information • Full tractability on all system activity, inkl who took part of information
  • 5. Password-based authentication and access • Authorization based on security level at end-user • Encrypted transfer Since Connect & Protect is built on a service-oriented systems architecture, it is easy to integrate new data sources, given that these are specified in a unified manner. A number of local and national Swedish information feeds have been integrated, such as 112 alerts, weather, map services, web cams etc. All RSS-feeds are supported 11. TIES Architecture
  • 6. 13. TIES Overview Actionable mission-critical information where and when you need it. TIES is a Web 2.0 information sharing service used by public and private Communities of Trust concerned with security risks, supply chain bottlenecks, brand compromise, and more. TIES delivers: • Up-to-the-minute critical information from thousands of sources: open source, commercial and government-restricted • Customized and configurable dashboards for relevance to you • Layered “operational pictures” for any and all enterprise functions • Community of Trust management • Advanced, policy-driven targeting and filtering As part of the TIES system, TIES Mobile provides secure, location-aware two-way alerting. With support for both standard browser and Windows Mobile platforms, TIES Mobile drives real-time alerts and maps to Blackberry, iPhone, Windows Mobile 5/6 devices. TIES Mobile delivers: • Field-based alert creation with multi-media support (image, video and audio) • Continuous tracking of mobile users or assets (e.g. Executive Protection) • Dynamic alert mapping • GPS tracking • Secure, audited transactions 14. TIES Mobile Overview
  • 7. Mission-critical information for situational awareness, safety and risk management— wherever you are. As part of the TIES system, TIES Mobile displays real-time safety, security and risk management data consolidated from many sources directly to a mobile device. Engineered specifically for ease of use, TIES Mobile provides secure locationally aware two-way alerting. • Displays TIES-filtered alerts near your current location • Lets you create alerts in the field and upload into the TIES system—capture alert details, location, pictures • Dynamic alert mapping 15.Results Government Credentials •2008: Operation Golden Phoenix '08 •2008: Controlled Unclassified Information (CUI) •2006–2007: Spirals 1 and 2, Last Mile Intelligence Techniques (LMIT) program, Office of the Director of National Intelligence (ODNI) •2006: Information Sharing Cooperative Research and Development Agreement (CRADA) with NSA’s Information Assurance Directorate •2006: Synthetic Cities, Joint Forces Command, Dept of Defence
  • 8. •2004: Joint Warfighter Interoperability Demonstration, NORTHCOM •2003–present: Connect & Protect, City of Portland, Multnomah County, State of Oregon, et. Al •2004-05: LA RECON (Louisiana Emergency Command Operations Network), Dept of Defence Homeland Security and Defence Command and Control Advanced Concept Technology Demonstration (HLS/D C2 ACTD) •2003-04: TRANSEC-Net, a 22-port Information Sharing Pilot, TSA, Dept of Homeland Security •2002-2005: Homeland Security and Defence Command and Control Advanced Concept Technology Demonstration (HLS C2 ACTD) Dept of Defence. Awards and Recognition •2006: The CRADA between Swan Island Networks and the NSA/IAD is the subject of a two-part information sharing political analysis published in the Washington Times •2005: Wired Magazine publishes a story about Connect & Protect (an information sharing service based on Swan Island Networks' technology) describing it as a “radical breakthrough” in emergency management •2005: Swan Island Networks’ CEO wins Federal Computer Week 16th annual Federal 100 Award •2004: Connect & Protect is a finalist for the Homeland Security Innovation of the Year, given by the Ash Institute at Harvard’s John F. Kennedy School of Government •2004: Swan Island Networks’ flagship SWARM technology wins Top Ten Performer Award, Joint Warfighter Interoperability Demonstration •2003: Swan Island Networks’ CEO speaks at a US Chamber of Commerce conference, “The National Response Plan: Implications for Government, Non-Profit and Private Sector Disaster Coordination” 16.Business Benefits •Managed Services: Low-cost, agile commercial-off-the-shelf information services are quickly replacing expensive proprietary systems. •Agile Mashups: New Web 2.0-style geospatial systems are dynamically fusing together a variety of information sources—and providing flexible new views of changing conditions, in real-time. •Communities of Trust: Requirements for cross-agency, cross-jurisdiction information sharing services are met with new community-based information access models.
  • 9. 17.Conclusions A number of incidents and events, like the tsunami and various storms over the past years, clearly show the need for collaboration between government agencies to manage unexpected events and threats to society. Various initiatives have been made to facilitate this, including organisational changes, methods and technological development. Many organisations have developed their own command and control systems and in some cases exchange information with other agencies, but usually through “stovepipes”. Many organisations do however still lack application support for gathering information and sharing this with others in a secure manner. Getting organisations to collaborate in information sharing to support intelligence gathering and operational work is to a large degree a matter of mindset. Such projects do take time. Building trust is a key factor, where each information owner has concerns about the control and full ownership of his/her information and wh has access to this. Using a community structure similar to what has been implemented in Connect & Protect, this hurdle can be overcome. Conclusions from the project are that such a system as Connect & Protect can be implemented in a Swedish context within existing organisational framework. The project shows that there is a need for collaborative solutions that support sharing of emergency- related information across organisations. Development and use of standards for messaging, data feeds like RSS and geospatial mapping for publishing information is vital, and many of the involved agencies admit they need to review their existing information structures as their specific information is often “locked” into stovepipe applications. As the number of information resources grow exponentially and become available through various media and news services, there is an increasing need to provide access to various sources through a common interface. This enables forming a common operating picture across organisations and yet allows for flexibility to customise information views based on each users/ organisations needs and responsibilities. Empowering each information owner to control their own information and who has access to it is vital to the success of collaborative efforts in forming common operating pictures and sharing that information with others. References [1] [2] [3]