NSI Concept of Operations Version 1, December 2008
NSI Concept of Operations Version 1, December 2008
NSI Concept of Operations Version 1, December 2008
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>NSI</strong> <strong>Concept</strong> <strong>of</strong> <strong>Operations</strong><br />
TABLE OF CONTENTS<br />
Section 1 Introduction.............................................................................................................. 1<br />
1.1 Background............................................................................................................ 1<br />
1.2 The Nationwide SAR Initiative................................................................................. 3<br />
1.3 <strong>NSI</strong> <strong>Concept</strong> <strong>of</strong> <strong>Operations</strong> ...................................................................................... 4<br />
1.4 <strong>NSI</strong> Baseline Documents ......................................................................................... 5<br />
1.4.1 ISE-SAR Functional Standard............................................................................. 5<br />
1.4.2 Privacy and Civil Liberties Analysis .................................................................... 5<br />
1.4.3 ISE-SAR Evaluation Environment Documents ..................................................... 5<br />
1.5 Related Documents ................................................................................................. 6<br />
Section 2 <strong>NSI</strong> Requirements.................................................................................................... 7<br />
2.1 Overview ............................................................................................................... 7<br />
2.2 Operational Requirements........................................................................................ 7<br />
2.2.1 Introduction ...................................................................................................... 7<br />
2.2.2 Federal Responsibilities...................................................................................... 8<br />
2.2.3 State, Local, and Tribal Responsibilities............................................................... 9<br />
2.3 Privacy and Civil Liberties Requirements ................................................................ 10<br />
2.3.1 Introduction .................................................................................................... 10<br />
2.3.2 Specific Privacy Requirements.......................................................................... 11<br />
Section 3 <strong>NSI</strong> Business Process Overview............................................................................ 12<br />
3.1 Existing (“As-Is”) Process ..................................................................................... 12<br />
3.2 Objective (“To Be”) Process .................................................................................. 12<br />
3.3 Example Operational Scenario................................................................................ 13<br />
Section 4 Steps in the <strong>NSI</strong> Cycle............................................................................................ 16<br />
4.1 Planning............................................................................................................... 17<br />
4.1.1 Produce National Threat Assessments................................................................ 17<br />
4.1.2 Conduct Local or Regional Risk Assessments..................................................... 17<br />
4.1.3 Develop Local or Regional Information Requirements......................................... 18<br />
4.1.4 Train Personnel ............................................................................................... 18<br />
4.2 Gathering and Processing....................................................................................... 18<br />
4.2.1 Acquire Suspicious Activity Information............................................................ 18<br />
4.2.2 Perform Local Processing................................................................................. 19<br />
4.2.3 Provide SAR to Fusion Center or Federal Agencies............................................. 20<br />
4.3 Analysis and Production ........................................................................................ 20<br />
4.3.1 Process and Analyze SAR at Fusion Center or Federal Agency ............................ 20<br />
4.3.2 Determine and Document an ISE-SAR .............................................................. 21<br />
i