UICDS Update Newsletter Masthead
UICDS keeps you better informed so you can make better decisions.  UICDS is information sharing middleware for NIMS incident management that continuously receives and shares standardized data among many agencies during an incident.   Your everyday application gets from UICDS exactly the data you need to use, visualize, process, improve, decide, and then share back through UICDS to keep everyone informed.

 

Because UICDS is middleware, there is no new user interface to learn, no cost to obtain it, and you retain complete control over your data.  You get notified when an agency has provided new or updated incident data and you share your data with whom you want instantaneously and in the background without any disruption to your operation.

 

With UICDS you are better informed, your partners are better informed, and together you all make better response decisions.

 
 

Watch

UICDS The Movie 

UICDS The Movie Frame

 
 

Get UICDS Free from the Department of Homeland Security 

Apply to be a UICDS Pilot and get your own complete UICDS installation, including support, to improve your information sharing.  Make your request now.

 
 
Learn All About UICDS Interoperability Middleware in Just Two Minutes
Your time is valuable, so here it is in a nutshell.
UICDS is middleware to share information among applications used by all levels of government and critical infrastructure to manageincidents.   UICDS has no end-user interface, so there is no training or new applications to buy. 
You should care about UICDS if you manage emergencies or provide technologies to those who manage emergencies.

Click here for a two minute video introduction of UICDS from the UICDS.us website.

 

Follow UICDS on LinkedIn 
UICDS is now on LinkedIn, the premier business-related social networking site.  The site is self-described as the "unofficial UICDS discussion group" among Technology Providers and End-Users.

To join  the discussion group, View our profile on LinkedIn

 

UICDS Quick Links

 

UICDS Contacts

General Information 
uicds@dhs.gov

DHS S&T Program Manager 
Lawrence Skelly 
Email Now 
 
UICDS Project Manager
Chip Mahoney
Email Now 

UICDS Outreach Director
James W. Morentz, Ph.D.
Email Now

UICDS™ is a Trademark of the U.S. Department of Homeland Security 

 

UICDS Update Archives Link

Link to the UICDS Update Archives 

wwwUICDSus 

 
DHS ST Logo
UICDS Update
An Information Sharing Technology Program from the Department of Homeland Security Science and Technology Directorate
 

 

September 25, 2012

In this issue ... 
Drop Shadow Accent Image
InnovationsInnovations in Port Security with UICDS is Topic of the UICDS Tutorial and Biweekly Call on Thursday at Noon

  

The operation of our Nation's ports depends on carefully balancing competing needs: maintaining the security of these bustling economic and transportation hubs, ensuring the continued flow of goods, and ensuring that the multitude of agencies and components (police, harbor patrol, owners, businesses, etc.) involved in port security and operations can perform their daily activities.  The

PortSec Architecture and Information Flow
UICDS serves as the middleware for various information sources and port incidents, allowing the CREATE researchers to focus on the modeling and analysis of risk.
Department of Homeland Security Science and Technology Center of Excellence for Risk and Economic Analysis of Terrorism Events (CREATE) is developing the Port Security Risk Analysis and Resource Allocation System (PortSec), a decision-support system used to assess tactical and strategic risks to port operations and reduce risk from terrorist attacks.  UICDS is an integral part of PortSec enabling researchers and developers to focus on data analysis not the data collection which UICDS does so well. 

As shown in the above diagram, UICDS is at the center of aggregation of real-time, transactional data for the modeling and analysis done by PortSec. PortSec helps port security officers and analysts perform risk assessments and resource allocation in order to optimally balance security activities and countermeasures, business continuity, and daily port activities.  The PortSec software analyzes facts and figures about a port's layout and operations, anticipated attack vectors and methods, and cost of specific countermeasures. PortSec takes into account vulnerabilities, threats and potential resource allocations, and assesses them against consequences and costs.

 

Leading our discussion is Michael D. Orosz, Ph.D., Assistant Director and Lead, Decision Systems Group, Computational Systems and Technology, Information Sciences Institute, Viterbi School of Engineering, at the University of Southern California.  He will describe plans and performance of PortSec for risk-based analysis of security countermeasures to reconcile the seemingly opposing goals of minimizing the risk of terrorism while maintaining unimpeded flow of daily port activity.  

 

The challenge in undertaking these risk assessments and

PortSec Screen Illustration
The PortSec display shows the port map, resources available, and risk assessments and locations.

resource allocation analyses is that transport nodal points such as seaports are complex, composed of many components with varying degrees of dynamic interaction. 

 

Dynamically changing inputs from local data sources need to be factored into developing the current risk status, the results of which then must be provided to the port security managers and jurisdictional responders responsible for managing the risk in a cost-effective manner and appropriate action initiated.

 

CREATE has designed around UICDS as the transporter of this dynamic input data as well as the publisher of analytical results.  Eventually, PortSec will incorporate the experience of other UICDS implementations that have shared information from sensors, incident logs, personnel management, dispatch systems, video surveillance, common operating picture, and mobile applications.  The demonstration on the UICDS Tutorial and Biweekly Call will show how PortSec and UICDS will:

 

  • Receive data from sources such as ship arrival information from Los Angeles Marine Exchange, local transportation conditions from Caltrans and other local networks, up-to-date intelligence information from sources such as iSARs or the JRIC, etc.
  • Establish an incident event in UICDS that is then used to assess risk status to the ports' critical infrastructures, ships, terminals, etc.
  • Share allocation decisions as well as current operating picture (COP) - vessel locations, traffic, risk assessments are recorded and shared to authorized partners via UICDS
  • And provide actionable information to the POLA/POLB security officers, the respective control rooms, and the 13 jurisdictional agencies responsible for the ports complex 

 

So call into the tutorial and the always interesting "Open Mic" portion of the call where the UICDS participants take over for comments, questions, and updates.

Join the UICDS Tutorial and Biweekly Call on Thursday at Noon ET

 

Call: 800-366-7242    code 735108

 

You can join the online meeting from your PC or mobile device.  

 

Web CollaborationClick here

... If requested, enter your name and email address.
... If a password is required, enter the meeting password: uicds2012
... Click "Join." 

  

If you must manually enter the URL into your browser, select the UICDS Biweekly Call and use the password above when you link to:

 https://saicwebconferencing.webex.com 

Advance Set-up: WebEx will automatically set up Meeting Manager for Windows the first time you join a meeting. To save time, you can setup prior to the meeting by clicking here 

 

Drop Shadow Accent Image
backBack to School Special:  UICDS 101 - Everything You Need To Know About UICDS Tutorial Now Available on UICDS Collaboration Portal

  

Our most recent UICDS Tutorial and Biweekly Call highlighted Fall's "Back to School" feeling by taking a lesson-by-lesson look at UICDS, the free information sharing middleware from the Department of Homeland Security, Directorate of Science and Technology. 

  

We summarized more than two years of previous tutorials to describe all the major components of UICDS, both operational and technical.  

 

Learn how you can implement UICDS to fill your information sharing gaps.  Whether you are government or a private sector infrastructure, UICDS is the single most comprehensive way to share information - secure and by agreement, exactly the right information to coordinate your emergency planning and response.

 

The tutorial was the one-stop-shop for UICDS knowledge, taught in 10 lessons. 

 

  • Lesson 1:  Why You Need UICDS
  • Lesson 2:  Meeting Your Information Sharing Need With Common Operational Data
  • Lesson 3:  Traditional Data Sharing vs. UICDS - No Contest!
  • Lesson 4:  UICDS Middleware as the Integration Layer
  • Lesson 5:  How to Make Common Operational Data Common to All: Data Exchange Standards
  • Lesson 6:  Technical Overview:  The UICDS Core, Adapters, Work Products
  • Lesson 7:  Use Cases of Content Management Through UICDS
  • Lesson 8:  A Network of UICDS Core-to-Core   Two-Way Data Exchange
  • Lesson 9:  Let's Talk Data Security and Control
  • Lesson 10:  Now It Is Your Turn:  Implement UICDS and Solve Your Information Sharing Problems
          

This is truly the best way to get started with UICDS - whether you are technical or operational - you get a jump start on implementation.  Each lesson included a reference to documents or prior tutorials captured on video and available on the UICDS Collaboration Portal.  

 

View the UICDS 101 Back to School Special Tutorial on the UICDS Collaboration Portal now.

 

Drop Shadow Accent Image

ATOGreat Upcoming Tutorials this Fall

   

Watch this spot for new tutorials planned for the fall ...

 

Mobile App Field Observations

 

Moving information from the field - especially from mobile apps - is a new frontier for emergency management.  But with the abundance of handheld devices today, and the advent of social media taking pictures and making postings throughout an incident, UICDS is leading the way on this new form of information sharing.  This tutorial focuses on field observations and the use of the Sensor Observation Service (SOS).  In short, "human sensors" provide an extraordinary view of an incident. Whether formally involved in data collection using a field investigation tool or informally involved in crowd-sourced data submitted by individuals, the UICDS SOS is the ideal place to store observations and associate them with incidents.  This tutorial will describe Best Practices for using the SOS format for all the updates provided by the "human sensors" in the field.

 

Getting the UICDS Accreditation for Operation on Highly Security Networks

 

UICDS recently received the Authority To Operate (ATO) on one of the Department of Homeland Security secure networks.  This Certification and Accreditation (C&A) process delved deep into the inner workings and code of UICDS and into the implementation policies and procedures. UICDS passed with flying colors, in part because development follows the Capability Maturity Model Integration (CMMI) Level 3.   The CMMI is a process improvement maturity model for the development of products and services created by Carnegie Mellon University for the Department of Defense certification for which is now managed by the Software Engineering Institute.  It consists of best practices that address development and maintenance activities that cover the product lifecycle. Join us to learn more about the C&A process and how UICDS achieved this important accomplishment.

 

UICDS Self-Demo

 

This tutorial will provide you with all the information you need to see what UICDS can do.  This is live data being consumed by a UICDS Core from several different applications.  You will be able to actually use a number of applications to see the data and interact with it.  Thanks to the wonderful participation of some of the UICDS Technology Providers, you will be able to use live versions of their software to see UICDS data.  These include a video aggregation application, mobile apps, a utility outage response application, plus commonly available geospatial visualization tools like Google Earth.  So join us for this tutorial and walk away with the ability to use UICDS at your desk or on your phone.  

Drop Shadow Accent Image
NewVersionNew Version of UICDS Features and Benefits Tutorial Now Available on UICDS Collaboration Portal

 

The release of UICDS Version 1.2.1 is fully discussed in a recent UICDS Tutorial and Biweekly Call that describes how you can upgrade to this new version - or start your UICDS implementation at the most capable UICDS ever.  

 

The tutorial highlighted features of the release including backward compatiblity, improved performance in off-nominal network environments, and aligning the UICDS AdminConsole with the Section 508 Amendment to the Rehabilitation Act of 1973.  In addition to these changes to the UICDS code base, the significantly simplified UICDS installation was demonstrated live on the tutorial.

 

In addition, we improved UICDS performance in off-nominal environments focusing on UICDS core-to-core connectivity in the presence of intermittent network availability.  There is now greater assurance that UICDS Work Products are shared reliably between UICDS cores by incorporating several connection checking features.

 

In order to facilitate the administration of UICDS by people with disabilities, as guided by Section 508, the UICDS Team incorporated text equivalent labels to the UICDS AdminConsole elements and enabled keyboard-based access to the AdminConsole, among other enhancements.

 

Finally, on the tutorial, the UICDS Team showed the significantly reduced UICDS installation process. Demonstrated live on the tutorial was the UICDS InstallKit installation which had its internal processing commands reduced from 108 to 18 and the human interaction during the installation reduced to 3 entries.  The entire installation took under 10 minutes and was greeted by great applause from those "old hands" among UICDS Technology Providers who understood the value of this new release.   

 

View the UICDS Version 1.2.1 Introduction Tutorial on the UICDS Collaboration Platform at UICDS.us.

Drop Shadow Accent Image
appcodeUICDS Mobile App Example Code Available for Android® and Apple® 

 

Just as we have provided lots of example code for web application developers to download and make their own, we also have example code for Android phones and Apple iPad and iPhone.  Download requires access credentials that were provided for those who have received the UICDS Core Development Kit.  If you do not have credentials, you can request access by linking to either Request the UICDS Development Kit or Apply to be a UICDS Pilot, depending on your circumstance.

 

Use your access credentials to download the Android Example Code.  

 

Use you access credentials to download the iPad and iPhone App Example Code.

 

If you missed the live presentation on both Android and Apple UICDS Mobile Apps, you can tune into the UICDS Collaboration Portal (www.UICDS.usat any time to hear these informative discussions.  You can also directly View the Android Tutorial or View the iPad and iPhone Tutorial.  

Drop Shadow Accent Image

pilotBecome a UICDS Pilot - Yours from DHS 

 
Tired of watching and want to get involved?  Are you a government agency that knows you should share information better?  Critical infrastructure owner/operator in need of coordination with governments?  Technology provider who wants to better serve emergency management and response organizations? 

It is time to become a UICDS Pilot.  All you need to do is answer a few questions to apply to be a UICDS Pilot. 
 
Drop Shadow Accent Image
TechnologyProvidersUse the UICDS Development Kit To Win Contracts that Require UICDS Compliance 
Recently, the State of California and the State of West Virginia both issued requests for proposals that called for UICDS compliance as a condition of the contract.  Feeling left behind?  
Now there is a guide to what it means to "comply" with UICDS.  Get the new  UICDS Compliance Overview report to see the details.  And you can see and listen to the UICDS Compliance Tutorial about compliance with UICDS v 1.1.1 on the UICDS Collaboration Portal.    
If this is you ... and you don't want to be excluded from future bids ... just answer a few questions to get the UICDS Development Kit and example code to build your UICDS Adapter today.  Get started by clicking here.
Drop Shadow Accent Image
 

UICDS

Tutorial and Biweekly  

Call ... 
Don't forget to join us every other Thursday at noon for the UICDS Tutorial and "Open Mic" call.  Join Technology Providers and End-Users who discuss all the value they get - and sometimes the problems they have - in getting UICDS implemented in an area.  This is the frank, no-holds-barred discussion to help get everyone operating better and at lower cost in time and money than they probably could do alone.  Nobody who participates walks away without a tip, an idea, or a good sense of how to proceed with UICDS information sharing.  

Call 1-800-366-7242 code 735108 at noon ET every other Thursday. 

 Check the UICDS Calendar for the exact date.