U.S. flag

An official website of the United States government, Department of Justice.

Cyber Integration for Fusion Centers: An Appendix to the Baseline Capabilities for State and Major Urban Area Fusion Centers

NCJ Number
306334
Date Published
May 2015
Length
32 pages
Publication Series
Annotation

This document identifies recommended actions and guidance for state and major urban area fusion centers to integrate information technology, cybersecurity, and cybercrime prevention intelligence and analytic capabilities, in order to inform local, state, and national criminal justice activities that support and maintain U.S. cybersecurity.

Abstract

This document is an appendix to the Global Justice Information Sharing Initiative’s (Global) Baseline Capabilities for State and major Urban Area Fusion Centers (Baseline Capabilities); it identifies how state and major urban area fusion centers (fusion centers) can effectively integrate the information, resources, personnel, and expertise of cybercrime prevention (cyber) partners, stakeholders, and the cyber community, to enhance fusion center information and intelligence sharing processes, when developing and supporting a cyber capability. The introductory section discusses the cyber community’s role in meeting the baseline capabilities, the value added by cyber engagement with fusion centers, and a fusion center cyber toolkit. The next two sections provide a breakdown of the following Fusion Process Capabilities, including fusion center operational determination, planning and requirements development, information gathering/collection and recognition of indicators and warnings, processing and collation of information, intelligence analysis and production, intelligence and information dissemination, and reevaluation; and Management and Administrative Capabilities, including management and governance, information privacy protections, security, personnel and training, information technology/communications infrastructure, systems, equipment, facility, and physical infrastructure, and funding. The Appendixes provide a list of acronyms used; traffic light protocol; and cyber incident severity schema.

Date Published: May 1, 2015