Homeland Security

Homeland SecurityHomeland Security, which herein encompasses Homeland Defense and Civil Support, requires the cooperation of three major entities: the federal government to provide intelligence and long-range interdiction; the private sector to provide immediate protection of its assets; and state and local municipalities to provide first responder capabilities. Each of these comes with its own distinctive challenges that must be linked with the others.

IIT is the catalyst for strengthening those links. With dedicated personnel experienced in strategic planning, information and intelligence sharing, risk management, vulnerability assessments, consequence management, and first responder training, IIT is ideally suited to help tackle the challenge of homeland security.

IIT services and capabilities include:

24/7 Operations Center Design, Management, and Operation
IIT has a proven approach to the design, development, and operation of customized command and control and security centers effectively applying the most up to date communications, data management, and information visualization technologies.
• US Army Information Dominance Center
• Surface Transportation, Public Transportation, and Sharing Analysis Centers
• AAR Operations Center – IIT operates the 24/7 Railroad Security Operations Center. This Center coordinates information between the railroads, the ST-ISAC, and both Federal and State Governments.
Business Continuity and Disaster Recovery
IIT offers a comprehensive set of services designed to simulate, plan against, and ultimately survive potentially damaging situations. IIT goes beyond traditional disaster recovery planning to include Business Impact Analysis and take into account the reliance on an IT infrastructure for e-business and e-government operations. The resulting plan includes all critical business functions.
Computer Incident Response
IIT provides a cost-efficient strategy for dealing with network security incidents. IIT has demonstrated expertise in designing Computer Incident Response Facilities and Teams, and can assist in building your team, to include development of technical and procedural policies and provide training resources. IIT also offers remote assistance and on-site incident analysis and recovery services.

Information Sharing
Information accessibility, integrity, and sharing represent critical foundations of the National Homeland Security Strategy. Information fusion – tying together the appropriate pieces of information from multiple sources and providing that information quickly, securely, and confidentially to operations personnel who may then act upon it – is essential for detecting, preparing, preventing, protecting, responding, and recovering from crisis events. Incorporating the concepts of Information Operations allows IIT to gain and maintain information superiority for its clients, a condition that allows leaders to seize, retain, and exploit the initiative in a crisis event, facilitating more effective decision making and faster execution.
Risk Management Planning and Implementation
Risk management is the continuous process of selecting, implementing, and monitoring countermeasures to maintain an acceptable level of risk at an acceptable cost. IIT begins the process with an assessment of an organization’s critical assets and the impact of their degradation, their vulnerability to exploitation, and the nature and likelihood of specific threats. This information is used to identify and evaluate risks and develop effective countermeasures to reduce that risk.
Threat and Vulnerability Analysis
With a unique focus on managing business and information related risk, IIT works with organizations to examine the threats they face and to analyze their unique vulnerabilities.The primary objectives of a vulnerability assessment (VA) are to provide information on the security and operational posture of a military unit or commercial enterprise to improve mission capability, and to protect proprietary technology/information by identifying Information Operations (IO) vulnerabilities in some or all of the following areas:
• Deficiencies in policy, programs, or personnel security resulting in Organizational vulnerabilities.
• Vulnerabilities resulting from Organizational structure and information flow.
• Vulnerability of computer networks, and the systems they support, to threats which could adversely impact the unit’s ability to accomplish critical mission functions.
• Vulnerability to enemy/adversary intelligence activities including SIGINT, IMINT and HUMINT. Vulnerabilities identified through counterintelligence activities.
• People, process or technology vulnerabilities identified via a SSE-CMM (ISO 21827) survey.
• Enforcement in areas of OPSEC, INFOSEC, or physical/personnel security.
After analyzing the current situation and risk from all perspectives (people, processes, technology), the IIT team will produce a detailed report, complete with recommendations to address all findings. Customers may then rely on IIT for all security process reengineering, infrastructure improvement, training and implementation needs.

Related Resources