Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004

Embed Size (px)

DESCRIPTION

Michael C. Daconta March 15, Where we are today…  Volume 1 is released.  1-fea.html 1-fea.html  Agency comments have been collected  Send your comments to  We plan on posting comments (without attribution) to a public site.  DRM Working Group planning is underway  Broad participation including State and Local  Address Business and Technical Issues  Foster broad adoption and implementation  Satisfy the Presidential Orders/Directives

Citation preview

Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004 Michael C. Daconta March 15, Agenda Where we are Today What is the DRM? The Information Sharing Imperative Information Sharing Use Case Where is the DRM Going? DRM Working Group Volume Strategy Implementation Profiles Conclusion Michael C. Daconta March 15, Where we are today Volume 1 is released. 1-fea.html1-fea.html Agency comments have been collected Send your comments to We plan on posting comments (without attribution) to a public site. DRM Working Group planning is underway Broad participation including State and Local Address Business and Technical Issues Foster broad adoption and implementation Satisfy the Presidential Orders/Directives Michael C. Daconta March 15, What is the DRM? (1) - Describe Logical Data Modeling. Class, Property, Data Type, Association Goals: Unambiguous! Defined Registered Michael C. Daconta March 15, What is the DRM? (2) - Discover Taxonomy Article at XML.com Context is more than categorization. Business Rules Reification Pragmatics Michael C. Daconta March 15, What is the DRM? (3) - Share XML Messaging, Federated Query, Concepts still evolving NIEM Announcement - Feb. 28 th : Michael C. Daconta March 15, The Information Sharing Imperative: EO 13356: Strengthening the Sharing of Terrorism Information to Protect Americans Section 1. Policy: Agencies shall give the highest priority to interchange of terrorism information among between agencies and appropriate authorities of States and local governments [while protecting] the freedom of Americans. Section 3. Preparing Terrorism Information for Maximum Distribution within Intelligence Community. IC Agencies shall set forth standards for sharing of terrorism information by agencies within the Intelligence Community with [through DHS] appropriate authorities of State and local governments. Section 4. Requirements for Collection of Terrorism Information Inside the United States. Attorney General, Secretary for Homeland Security, and the DCI shall jointly submit their recommendation on the establishment of executive branch-wide collection and sharing requirements, procedures, and guidelines for terrorism information to be collected within the United States, including, but not limited to, from publicly available sources, including nongovernmental databases. Section 5. Establishment of the Information Systems Council. The mission of the Council is to plan for and oversee the establishment of an interoperable terrorism information sharing environment to facilitate automated sharing of terrorism information among appropriate agencies. Michael C. Daconta March 15, DRM Use Case: Information Sharing Description Sharing Context Org 1 Org 2 Data Elems Data Elems Exchange packages Registry COI Context Core Context Components Assembly Discovery Michael C. Daconta March 15, Information Sharing Use Case (1) Markle Report. Creating a Trusted Network for Homeland Security Vignette 3. Scenario: Terrorists planning an attack on Rail lines using Chlorine gas Michael C. Daconta March 15, Information Sharing Use Case (2) Agency X collects data. Using the DRM, Agency X creates metadata that describes this data in an unambiguous manner. Rail Yard Terrorist Organization: + name: Al Qaeda Incident + when + where + what + who Zoo Person Chemical Plant Terrorist Terrorist Organization + name Chemical + name Chemical + name: Chlorine Michael C. Daconta March 15, Information Sharing Use Case (3) Agency Y needs data to perform analysis. Agency Y discovers Agency X has the data it needs Target Organization Indicators Vulnerability Capability Law Enforcement Law Enforcement Intel Infrastructure Protection Lethal Agent Facility LOB Michael C. Daconta March 15, Information Sharing Use Case (4) Agency Y and Agency X assemble Exchange Packages. Incident Report + who + what + when + where + activity Humint Report Threat Report TargetCapability Police Incident Infrastructure Incident CriticalNon-Critical Chemical Plant Rail YardZoo Michael C. Daconta March 15, Information Sharing Use Case (5) Data is exchanged. CIA Rail Yard Police Dept. Zoo Chemical Plant Infrastructure Protection Intel Law Enforcement Law Enforcement Law Analysis Center Industry Analysis Center States Shared Space DHS Threat Report Incident NCTC DHS Michael C. Daconta March 15, Information Sharing Use Case (6) Data is associated in a shared space. Shared Space Threat Report 1 Capability: Chlorine Gas Target: Rail Lines Incident 2: Police Incident 3: Chemical Incident 1: Zoo Incident 4: Rail Yard Michael C. Daconta March 15, Where is the DRM Going? DRM Working Group Volume Strategy Implementation Profiles Michael C. Daconta March 15, Working Group Structure Three tiers Public participation Virtual Wiki Quarterly F2F Forums Team participation Stakeholders, Team Leads/Editors Bi-Weekly Meetings Business Sponsor Group Executive Committee Dispute Resolution Weekly Meetings Public Teams Exec Michael C. Daconta March 15, Volume Strategy (*OFFICIAL*) Change the volume strategy from the current plan by creating cohesive volumes around functional lines. Overview DRM Management Strategy Description Exchange (possibly broadened to Information Sharing) Context Sections in each of the above on Security & Privacy Given broad virtual participation and active Stakeholder involvement, execute the volumes in parallel Implementation Profiles Relational XML Semantic Technologies Michael C. Daconta March 15, Revised DRM Structure Subject Context Security ContextService Context Information Access Data Element Description Resource Description Subject Area Association Query Class Association Resource Class Association Data Property Data Class Unique Identifiers Association Security Class Association Subject Class Association Input/Output Service Class Who What When Where Why Context Information Exchange Exchange Payload Association Exchange Class Sharing Description Structured Semi-Structured Unstructured Michael C. Daconta March 15, XML Profile of the DRM Subject Context Security ContextService Context Information Access Data Element Description Resource Description Who What When Where Why Context Information Exchange Sharing Description Structured Semi-Structured Unstructured XML Topic Map & OWL Lite Web Service Entry (UDDI) IC Information Security Marking Message XML Schemas Federated Query & RSS DOD Discovery Medata Spec XML Schema Types XLINK Michael C. Daconta March 15, Conclusion How you can help! For stakeholders, we need more editors and contributors! Comment on the DRM Comment on the Success Strategy Questions?