Advanced search Help
Searching for terms: EXACT: "United States. Department of Homeland Security. Office of Emergency Communications" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Interoperability Planning for Wireless Broadband
"The U.S. Department of Homeland Security's Office of Emergency Communications (OEC) created this document, in coordination with the emergency response community, to help Statewide Interoperability Coordinators plan for wireless broadband use in emergency communications. Established by Congress, OEC was stood up on April 1, 2007 in response to the communications challenges witnessed during Hurricane Katrina. OEC's mission is to support and promote the ability of public safety and government officials to continue to communicate in the event of natural disasters, acts of terrorism, or other man-made disasters, and work to ensure, accelerate, and attain interoperable and operable emergency communications nationwide. In 2008, OEC published the 'National Emergency Communications Plan'--the Nation's first strategic plan to address nationwide interoperable communications. Wireless broadband in emergency communications is rapidly becoming an essential component of nationwide interoperability. This document provides an overview of broadband technology, guidance on interoperability planning for broadband, best practices from waiver jurisdictions, and regional governance considerations. Although targeted toward Statewide Interoperability Coordinators, the topics are relevant to all public safety stakeholders. This document serves as a reliable and comprehensive source of information about wireless broadband in the emergency response environment."
United States. Department of Homeland Security. Office of Emergency Communications
2011-11
-
Emergency Communications System Life Cycle Planning Guide
From the Opening Letter of Chris Essid: "Public safety systems, whether they are land mobile radio systems or mobile data systems, can be complex and costly to implement. There are many technical challenges, but it is also important that those entrusted to make decisions understand the elements that go into deploying and managing these systems. System life cycle planning is a critical part of this understanding because it enables practitioners to better forecast long-term funding requirements and helps to set the framework for establishing and maintaining a public safety system. The Department of Homeland Security's Office of Emergency Communications within the National Protection and Programs Directorate's Office of Cybersecurity and Communications developed, with practitioner input, this System Life Cycle Planning Guide to assist you in your efforts to design, implement, support, and maintain a public safety communications system. The guide walks you through a number of steps and provides a high-level description of each area to help you fully engage in successful systems life cycle management. The guide is a starting point from which your organization can begin to plan and budget for a public safety system's implementation. Additionally, the guide provides information to help you educate agency or jurisdictional leadership on the complexity of public safety systems in support of your system justification."
United States. Department of Homeland Security. Office of Emergency Communications
2011-08
-
Regional Interoperability Communications Plan
From the Introduction: "This document offers States guidance on completing the RICP [Regional Interoperability Communications Plan] template and provides further explanation on the types of information contained in each of the sections of the RICP template. It is a companion guide to the RICP template itself, which can be customized by States prior to sending the RICP template out to its regions for completion. It is the intent of the US Department of Homeland Security's Office of Emergency Communications (OEC) to provide States and their regions with a manageable template that can be easily adapted for their specific need."
United States. Department of Homeland Security. Office of Emergency Communications
2011-09
-
Auxiliary Communications Field Operations Guide (AUXFOG) [Version 1.0]
From the Introduction: "The Auxiliary Communications Field Operations Guide (AUXFOG) is a collection of technical reference and training information to aid trained volunteer Auxiliary Communications (AuxComm) personnel, and the agencies they serve, to supplement local emergency communications when AuxComm support is requested. AuxComm is an all-inclusive term used to describe the many organizations and personnel that provide various types of communications support to emergency management, public safety, and other government agencies. Auxiliary Communicators have been assisting the public safety community for over 100 years. These uniquely qualified communicators give their time and resources freely, without hesitation, providing auxiliary communications to NIMS/ICS [National Incident Management System Incident Command System] personnel and public safety partners. Additionally, Auxiliary Communicators frequently provide communications support during planned events, community functions, and training exercises. The contents of this guide are for training and reference, and should support the goals of your local, county, region or state government officials. It should not be used in any way to circumvent or override those established goals. Direction for the use of auxiliary communications, under NIMS/ICS, will come from either a Communications Leader (COML) or a member of the public safety agency being supported."
United States. Department of Homeland Security. Office of Emergency Communications
2013-11
-
Technical Assistance & Statewide Communications Interoperability Plan (SCIP) Catalog [Version 4.1]
"This year's Catalog reflects the merger of the statewide planning function with legacy technical assistance into a single entity. OEC/ICTAP [Office of Emergency Services Interoperable Communications Technical Assistance Program] services are expanding and making a significant impact on our stakeholders' interoperable and emergency communications capabilities. There are several new or revised TA offerings this year including, among others, broadband workshops, new Communications Unit training courses, and a revised offerings for NG9-1-1 [Next Generation 9-1-1] and dispatch operations. New offerings are marked with a special tag by the offering name."
United States. Department of Homeland Security. Office of Emergency Communications
2014?
-
DHS Emergency Communications Forum (Volume 18)
This edition of DHS' Emergency Communications Forum contains the following articles: "A Note from OEC [Office of Emergency Communications] Leadership"; "Communications Planning for the U.S. Open"; "The Continued Importance of Emergency Communications Planning"; "2015 Maryland Command and Communications Rally"; "OEC Support for the Pope's U.S. Visit"; "OEC Supports ESF [emergency support function] #2 Activities in CNMI [Commonwealth of Northern Mariana Islands]"; "OEC Releases Emergency Communications Governance Guide"; "Southeast US EMAC [Emergency Management Assistance Compact] Deployments of COMU [All-Hazards
Communications Unit] Resources"; "Recap of Recent OEC Engagements"; "Sprint Drops WPS [ Wireless Priority Service] Subscription Fees"; and "OEC Team on the Road".
United States. Department of Homeland Security. Office of Emergency Communications
2016
-
Establishing Governance to Achieve Statewide Communications Interoperability: A Guide for Statewide Communication Interoperability (SCIP) Implementation
"In 2007, through its Directorate for National Protection and Programs, the Department of Homeland Security (DHS) established the Office of Emergency Communications (OEC) to promote the ability of emergency responders and government officials to maintain communication in the event of natural disasters, act of terrorism, or other man-made disaster, and to ensure, accelerate, and attain interoperable and operable emergency communications nationwide. OEC, in conjunction with its Federal partners, provides guidance, tools, and templates on communications-related issues to Federal, State, local, and tribal emergency response agencies. Since its inception, OEC has operated under the principle that any successful effort to improve emergency response communications interoperability must take into account the views of emergency responders on the front lines in large, small, rural, and urban communities across the Nation. As outlined in the National Emergency Communications Plan (NECP), achieving the Nation's communications interoperability vision, goals, objectives, and priority initiatives is not a task the Federal Government can accomplish on its own--it is largely a practitioner-driven effort that requires coordination among all stakeholders."
United States. Department of Homeland Security. Office of Emergency Communications
2008-12
-
National Interoperability Field Operations Guide Version 1.3
"The National Interoperability Field Operations Guide (NIFOG) is a technical reference for radio technicians responsible for radios that will be used in disaster response applications, and for emergency communications planners. The NIFOG includes rules and regulations for use of nationwide and other interoperability channels, frequencies and channel names, and other reference material; formatted as a pocket-sized guide for radio technicians to carry with them."
United States. Department of Homeland Security. Office of Emergency Communications
2009-05
-
DHS OEC FY2019 TA/SCIP Guide: Highlights & Offerings
From the Foreword: "The Office of Emergency Communications (OEC) is pleased to publish the Fiscal Year (FY) 2019 Technical Assistance (TA)/Statewide Communication Interoperability Plan (SCIP) Guide. This year's Guide includes new or enhanced offerings and approaches to help public safety and government officials meet the challenges in the rapidly changing voice and data interoperability landscape and the expanding communications ecosystem. Public safety has seen a rapid expansion in recent years in the type and manner of information sharing among responders and government officials. New applications and systems have created new challenges for interoperability. It demands good governance to drive standard operating procedures on how to use these technologies, and then joint training and exercises to ensure interoperability is achieved when needed most - at the next incident or event. In FY2019, OEC will continue delivering products and services that support interoperability in this evolving emergency communications ecosystem."
United States. Department of Homeland Security. Office of Emergency Communications
2018-10
-
Emergency Communications Forum - Volume 3, September 2010
This edition of the Emergency Communications Forum contains the following articles: "Oil in the Gulf: Planning for the Unknown"; "NECP [National
Emergency Communications Plan] Two Years Later: Impact of the Nation's First Strategic Plan"; "2010 SCIP [Statewide Communication Interoperability Plan] Implementation Workshops"; "From the Field: Flooding in Tennessee"; and "WyoLink: An Innovative Federal-State Resource Sharing Project".
United States. Department of Homeland Security. Office of Emergency Communications
2010-09
-
Statewide Communication Interoperability Plans Frequently Asked Questions (FAQs)
This document from the Department of Homeland Security's Office of Emergency Communications offers a comprehensive list of answers to frequently asked questions regarding Statewide Communication Interoperability Plans.
United States. Department of Homeland Security. Office of Emergency Communications
2007
-
Statewide Communication Interoperability Plan (SCIP) Weighted Evaluation Criteria
"The Public Safety Interoperable Communications (PSIC) Grant Program and the Fiscal Year 2007 Homeland Security Grant Program (HSGP) have required States and Territories to develop and adopt a Statewide Communication Interoperability Plan (SCIP). In accordance with the PSIC Grant Program, States and Territories must submit final SCIPs and Investment Justifications (IJs) by December 3, 2007. The Office of Emergency Communications (OEC) within the Department of Homeland Security (DHS) is responsible for reviewing all SCIPs. The following document is intended to provide States and Territories with further clarification on how SCIPs will be evaluated, highlighting the SCIP Weighted Evaluation Criteria."
United States. Department of Homeland Security. Office of Emergency Communications
2007-09
-
Emergency Communications Forum - Volume 1, April 2010
This edition of the Department of Homeland Security's Office of Emergency Communications' (OEC) Emergency Communications Forum contains the following articles: "OEC Trains 1,600 First Responders as COMLs [Communications Unit
Leader]"; "From the Field: Questions and Answers with Arkansas Statewide
Interoperability Coordinator (SWIC) Penny Rubow"; and "BIDP [Border
Interoperability Demonstration Project] Grant Program Targets Border Interoperability".
United States. Department of Homeland Security. Office of Emergency Communications
2010-04
-
OEC Bulletin, Spring 2008
"The mission of the Office of Emergency Communications (OEC) is to support and promote the ability of emergency responders and government officials to communicate in the event of natural disasters, acts of terrorism, or other man-made disasters. OEC works to ensure, accelerate, and attain interoperable and operable emergency communications nationwide." This edition of the OEC Bulletin contains the following articles: "OEC Goes South-and North-of the Border"; "Southwest Border Communications Working Group"; "ICTAP [Interoperable Communications Technical Assistance Program] Observes 2008 Gasparilla Festival"; "New Hampshire's Uniform Frequency Matrix Permits Easy Interoperability"; "SCIP [Statewide Communications Interoperability Plan]and PSIC [Public Safety Interoperable Communications] IJ [Investment Justification] Peer Review Process"; and "In Memoriam: Marilyn Praisner".
United States. Department of Homeland Security. Office of Emergency Communications
2008
-
OEC Bulletin, October / November 2007
"The mission of the Office of Emergency Communications [OEC] is to support and promote the ability of emergency responders and government officials to communicate in the event of natural disasters, acts of terrorism, or other man-made disasters, and works to ensure, accelerate, and attain interoperable and operable emergency communications nationwide." This edition of the OEC Bulletin contains the following articles: "About the Office of Emergency Communications"; "OEC Oversees Statewide Communications Plan Efforts"; "Successful Communications at Minnesota Bridge Collapse"; "Golden Phoenix Exercise"; and OEC Participates in IACP [International Association of Chiefs of Police] Conference".
United States. Department of Homeland Security. Office of Emergency Communications
2007-11
-
OEC Bulletin, December 2007/January 2008
"The mission of the Office of Emergency Communications (OEC) is to support and promote the ability of emergency responders and government officials to communicate in the event of natural disasters, acts of terrorism, or other man-made disasters. OEC works to ensure, accelerate, and attain interoperable and operable emergency communications nationwide." This edition of the OEC Bulletin contains the following articles: "Looking Forward to FY 2008"; "Federal Partnership for Interoperable Communications"; "OEC Supports SCIP [Statewide Communications Interoperability Plans] and PSIC [Public Safety Interoperable Communications] Efforts"; "San Diego Successfully Employs Lessons Learned in Coordinated Response to Wildfires"; and "New OEC Leadership Chris Essid".
United States. Department of Homeland Security. Office of Emergency Communications
2008-01
-
All-Hazards Type III Communications Unit Leader: Frequently Asked Questions
This document from the United States Department of Homeland Security Office of Emergency Communications [OEC] answers the following questions regarding an All-Hazards Type III Communications Unit Leader [COML]: "What is an All-Hazards Type III Communications Unit Leader?" "What constitutes a Type III Event?" "Who should be trained as an All-Hazards Type III COML?" "What are the prerequisites for taking the class?" "Does completing the class make me a COML?" "Our State would like to train our own trainers to teach the COML class. Is a Train-the-Trainer class available?" "What are the qualifications to be a COML Trainer?" "Where do I go to see a schedule of COML classes and COML Train-the-Trainer classes sponsored by OEC?" "Can grant funds be used to attend COML training?" "Our State would like to sponsor our own COML training. Until our own
trainers can be trained, whom do I contact to find qualified instructors?" and "Whom can I contact within DHS to obtain additional information on COML
training?"
United States. Department of Homeland Security. Office of Emergency Communications
2009
-
ICSA-13-045-01 - Tridium NiagaraAX Directory Traversal Vulnerability
"This advisory provides mitigation details for a vulnerability in the Tridium NiagaraAX software. Independent researchers Billy Rios and Terry McCorkle discovered a directory traversal vulnerability in the Tridium NiagaraAX software product. They demonstrated that with a valid user account or guest privileges enabled, privilege escalation is possible on a NiagaraAX system. Exploitation of this vulnerability could allow loss of availability, integrity, and confidentiality of the system. Tridium has produced a patch that mitigates this vulnerability. This vulnerability is remotely exploitable."
United States. Department of Homeland Security. Office of Emergency Communications
2013-02-14
-
ICS-CERT Advisory: ICSA-13-050-01A: 3S CODESYS Gateway-Server Multiple Vulnerabilities, Update A
This advisory is from the Department of Homeland Security's Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), a part of the U.S. Computer Emergency Readiness Team (US-CERT). "This updated advisory is a follow-up to the original advisory titled ICSA-13-050-01, 3S CODESYS Gateway-Server Multiple Vulnerabilities that was published February 19, 2013, on the ICS-CERT Web page. This updated advisory provides mitigation details for multiple vulnerabilities in the 3S-Smart Software Solutions GmbH CODESYS Gateway-Server. Independent researcher Aaron Portnoy of Exodus Intelligence has identified five vulnerabilities in the 3S CODESYS Gateway-Server application. 3S has produced a security patch that mitigates these vulnerabilities. Successful exploitation of these vulnerabilities could allow remote code execution. The Gateway-Server is a third-party component found in multiple control systems manufacturer's products. These vulnerabilities affect products primarily found in the energy, critical manufacturing, and industrial automation industries. These vulnerabilities could be exploited remotely."
United States. Department of Homeland Security. Office of Emergency Communications
2013-03-27
-
ICS-CERT Advisory: ICSA-13-067-02: Invensys Wonderware Win-XML Exporter Improper Input Validation Vulnerability
This advisory is from the Department of Homeland Security's Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), a part of the U.S. Computer Emergency Readiness Team (US-CERT). "This advisory was originally posted to the US-CERT secure Portal library on March 08, 2013, and is now being released to the ICS-CERT Web page. This advisory provides mitigation details for a vulnerability that impacts the Invensys Wonderware Win-XML Exporter. Researchers Timur Yunusov, Alexey Osipov, and Ilya Karpov of the Positive Technologies Research Team have discovered an improper input validation vulnerability in the Invensys Wonderware Win-XML Exporter. Invensys has released a patch that mitigates the vulnerability. The Positive Technologies Research Team has validated that the patch fixes the vulnerability. Exploitation of this vulnerability could impact systems deployed in the critical manufacturing, energy, food and beverage, chemical, and water and wastewater sectors."
United States. Department of Homeland Security. Office of Emergency Communications
2013-03-21
-
ICS-CERT Advisory: ICSA-13-084-01: Siemens CP 1604 and CP 1616 Improper Access Control
This advisory is from the Department of Homeland Security's Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), a part of the U.S. Computer Emergency Readiness Team (US-CERT). "This advisory provides mitigation details for a vulnerability that impacts the Siemens CP 1604 and CP 1616 communication modules. Siemens has identified a vulnerability in the debugging interface of the CP 1604 and CP 1616 communications modules. Independent researchers Christopher Scheuring and Jürgen Bilberger from Daimler TSS GmbH coordinated disclosure of the vulnerability with Siemens. These products are used to connect PCI-104 systems to the PROFINET IO. By default, the debugging interface has been left enabled and can be accessed remotely on both devices. This remote access could lead to compromise of the system by denial of service (DoS), remote code execution, and loss of confidentiality. Siemens has produced a firmware update to mitigate the vulnerability. This vulnerability could be exploited remotely."
United States. Department of Homeland Security. Office of Emergency Communications
2013-03-25
-
ICS-CERT Advisory: ICSA-13-095-02: Rockwell Automation FactoryTalk and RSLinx Multiple Vulnerabilities
This advisory is from the Department of Homeland Security's Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), a part of the U.S. Computer Emergency Readiness Team (US-CERT). "Researcher Carsten Eiram of Risk Based Security has identified multiple input validation vulnerabilities in Rockwell Automation's FactoryTalk Services Platform (RNADiagnostics.dll) and RSLinx Enterprise Software (LogReceiver.exe and Logger.dll). Rockwell Automation has produced patches that mitigate these vulnerabilities, and released the patches April 5, 2013. Rockwell Automation has tested the patches to validate that they resolve the vulnerabilities. These vulnerabilities could be exploited remotely."
United States. Department of Homeland Security. Office of Emergency Communications
2013-04-05
-
ICS-CERT Advisory: ICSA-13-095-01: Cogent Real-Time Systems Multiple Vulnerabilities
This advisory is from the Department of Homeland Security's Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), a part of the U.S. Computer Emergency Readiness Team (US-CERT). "Dillon Beresford of Cimation has identified multiple vulnerabilities in the Cogent Real-Time Systems DataHub application. Cogent has produced an update that mitigates these vulnerabilities. These vulnerabilities could be exploited remotely."
United States. Department of Homeland Security. Office of Emergency Communications
2013-04-05
-
ICS-CERT Advisory: ICSA-13-098-01: Canary Labs, Inc. TrendLink Insecure ActiveX Control Method
This advisory is from the Department of Homeland Security's Industrial Control Systems-Cyber Emergency Response Team (ICS-CERT), a part of the U.S. Computer Emergency Readiness Team (US-CERT). " This advisory provides mitigation details for a vulnerability in the Canary Labs, Inc. TrendLink software. Researcher Kuang-Chun Hung of Security Research and Service Institute�'Information and Communication Security Technology Center (ICST) has identified an insecure ActiveX control method vulnerability in Canary Labs, Inc. TrendLink ActiveX control. Canary Labs, Inc. has updated TrendLink, and Kuang-Chun Hung has tested the patch and verified that it mitigates the vulnerability. If exploited, an attacker could influence the paths or file names that are used in the software application. This could affect systems using TrendLink in the critical manufacturing and energy sectors in the United States, South America, and Europe. This vulnerability could be exploited remotely."
United States. Department of Homeland Security. Office of Emergency Communications
2013-04-08
-
ICS-CERT Advisory: ICSA-13-100-01: Schneider Electric MiCOM S1 Studio Improper Authorization Vulnerability
"This advisory provides mitigation details for a vulnerability affecting the Schneider Electric MiCOM S1 Studio Software. Independent researcher Michael Toecker of Digital Bond has identified an improper authorization vulnerability in the MiCOM S1 Studio Software using the Microsoft Attack Surface Analyzer tool. The vulnerability was disclosed to vendors prior to the 2013 Digital Bond S4 Conference and then presented at the conference. The function of MiCOM S1 Studio Software is to allow users to modify or manage the configuration parameters of electronic protective relays."
United States. Department of Homeland Security. Office of Emergency Communications
2013-04-10
-
FY 2013 Inspector General Federal Information Security Management Act Reporting Metrics
"Refer to the General Instructions section of the FY13 CIO [Chief Information Officer] Reporting Metrics, specifically the Definitions under each control area. All of these instructions apply to the OIG [Office of Inspector General] questions except the instructions for 'Structure and Organization.'"
United States. Department of Homeland Security. Office of Emergency Communications
2012-11-30
-
FY 13 Q1 Chief Information Officer Federal Information Security Management Act Reporting Metrics
"The majority of the FY13 Q1 metrics are based on the Administration Priorities."
United States. Department of Homeland Security. Office of Emergency Communications
2012-11-30
-
ICS-ALERT-11-291-01B: W32.Duqu-Malware Targeting ICS Manufacturers (UPDATE)
"This updated Alert is a follow-up to the original Alert titled "ICS-ALERT-11-291-01A - W32 Duqu-malware targeting ICS Manufacturers" that was published October 20, 2011 on the ICS-CERT [Industrial Control Systems Cyber Emergency Response Team] web. [...] ICS-CERT, in close coordination with Symantec and the original researchers, has determined after additional analysis that neither industrial control systems nor vendors/manufacturers were targeted by Duqu. In addition, as of October 21, 2011, there have been very few infections and there is no evidence based on current code analysis that Duqu presents a specific threat to industrial control systems. However, organizations should still remain vigilant against this and other sophisticated malware. ICS-CERT also recommends that the ICS community update intrusion prevention systems (IPSs) and antivirus systems to detect Duqu and other new threats. ICS-CERT will continue to analyze the malware, monitor the threat landscape, and report additional information as appropriate. ICS-CERT will also continue coordination with Symantec, McAfee, the international community, and ICS Stakeholders."
United States. Department of Homeland Security. Office of Emergency Communications
2013-04-29
-
ICS-ALERT-11-291-01: W32.Duqu-Malware Targeting ICS Manufacturers
"On October 18, 2011, Symantec released a Security Response Report describing W32.Duqu, an information-gathering threat targeting specific organizations, including industrial control systems (ICSs) manufacturers. According to Symantec, W32.Duqu does not contain any code related to ICSs and is primarily a remote access Trojan (RAT). Symantec reports that the original sample of W32.Duqu was gathered from a research organization based in Europe and that additional variants have been recovered from a second organization in Europe. According to Symantec, the attackers are looking for information, such as design documents, that could potentially be used in a future attack on an industrial control facility. This threat is highly targeted toward a limited number of organizations, apparently to exfiltrate data concerning their specific assets; the propagation method is not yet known. Symantec indicates that W32.Duqu is not self-replicating. Symantec reports that other attacks could be ongoing using undetected variants of W32.Duqu. Symantec states that they are continuing to analyze additional variants of W32.Duqu."
United States. Department of Homeland Security. Office of Emergency Communications
2011-10-18
-
ICS-CERT Alert: ICS-ALERT-11-256-01: Progea Movicon Multiple Vulnerabilities
"ICS-CERT [Industrial Control Systems Cyber Emergency Response Team] is aware of a public report of three vulnerabilities with proof of concept (POC) exploit code affecting Progea Movicon PowerHMI Version 11, a SCADA/HMI [Supervisory Control And Data Acquisition/Human Machine Interface] Product. The report was released without coordination with the vendor or ICS-CERT. ICS-CERT has not yet verified the vulnerabilities or POC code, but has reached out to the affected vendor to notify, confirm, and identify mitigations. ICS-CERT is issuing this alert to provide early notice of the report and identify baseline mitigations for reducing risks to these and other cybersecurity attacks."
United States. Department of Homeland Security. Office of Emergency Communications
2011-09-13