03.02.2015 Views

NSI Concept of Operations Version 1, December 2008

NSI Concept of Operations Version 1, December 2008

NSI Concept of Operations Version 1, December 2008

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>NSI</strong> <strong>Concept</strong> <strong>of</strong> <strong>Operations</strong><br />

TABLE OF CONTENTS<br />

Section 1 Introduction.............................................................................................................. 1<br />

1.1 Background............................................................................................................ 1<br />

1.2 The Nationwide SAR Initiative................................................................................. 3<br />

1.3 <strong>NSI</strong> <strong>Concept</strong> <strong>of</strong> <strong>Operations</strong> ...................................................................................... 4<br />

1.4 <strong>NSI</strong> Baseline Documents ......................................................................................... 5<br />

1.4.1 ISE-SAR Functional Standard............................................................................. 5<br />

1.4.2 Privacy and Civil Liberties Analysis .................................................................... 5<br />

1.4.3 ISE-SAR Evaluation Environment Documents ..................................................... 5<br />

1.5 Related Documents ................................................................................................. 6<br />

Section 2 <strong>NSI</strong> Requirements.................................................................................................... 7<br />

2.1 Overview ............................................................................................................... 7<br />

2.2 Operational Requirements........................................................................................ 7<br />

2.2.1 Introduction ...................................................................................................... 7<br />

2.2.2 Federal Responsibilities...................................................................................... 8<br />

2.2.3 State, Local, and Tribal Responsibilities............................................................... 9<br />

2.3 Privacy and Civil Liberties Requirements ................................................................ 10<br />

2.3.1 Introduction .................................................................................................... 10<br />

2.3.2 Specific Privacy Requirements.......................................................................... 11<br />

Section 3 <strong>NSI</strong> Business Process Overview............................................................................ 12<br />

3.1 Existing (“As-Is”) Process ..................................................................................... 12<br />

3.2 Objective (“To Be”) Process .................................................................................. 12<br />

3.3 Example Operational Scenario................................................................................ 13<br />

Section 4 Steps in the <strong>NSI</strong> Cycle............................................................................................ 16<br />

4.1 Planning............................................................................................................... 17<br />

4.1.1 Produce National Threat Assessments................................................................ 17<br />

4.1.2 Conduct Local or Regional Risk Assessments..................................................... 17<br />

4.1.3 Develop Local or Regional Information Requirements......................................... 18<br />

4.1.4 Train Personnel ............................................................................................... 18<br />

4.2 Gathering and Processing....................................................................................... 18<br />

4.2.1 Acquire Suspicious Activity Information............................................................ 18<br />

4.2.2 Perform Local Processing................................................................................. 19<br />

4.2.3 Provide SAR to Fusion Center or Federal Agencies............................................. 20<br />

4.3 Analysis and Production ........................................................................................ 20<br />

4.3.1 Process and Analyze SAR at Fusion Center or Federal Agency ............................ 20<br />

4.3.2 Determine and Document an ISE-SAR .............................................................. 21<br />

i

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!