Architecture for homeland security agencies coming together

Architecture for homeland security agencies coming together

Technology officials in the White House's Office of Homeland Security transition planning office have detailed the IT platforms for all 22 agencies that would be included in the new Homeland Security Department.

Jim Flyzik, senior adviser to Homeland Security director Tom Ridge, yesterday said his team finished the technical reference model and an application inventory for all the proposed agencies that could move into the new department. The technical reference model outlines the technology used to support the business lines.

Flyzik said much of this system architecture work would help the new agency start work immediately, which will be 90 days after Congress passes the legislation. Congress and the administration are at odds over work force issues and Flyzik said he believes the time frame of the legislation passing depends on which way the Senate goes in the November election.

'Unlike most mergers where there is a buyer and a buyee, this is an actual start-up,' Flyzik said. 'We have broken up our mission into short-term projects and Day 1 projects.'

The enterprise architecture approach Flyzik's team is taking will let the department finish four initiatives during the transition period. The projects include:

  • Consolidating the criminal and terrorist watch lists

  • Deploying a Homeland Security Department portal

  • Setting up secure videoconferencing

  • Setting up secure Internet expansion to share information with state and local authorities.


  • Flyzik delivered the keynote address at the FedFocus 2003 conference sponsored by Input of Chantilly, Va., in Reston, Va.

    Featured

    • automated processes (Nikolay Klimenko/Shutterstock.com)

      How the Army’s DORA bot cuts manual work for contracting professionals

      Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

    • Russia prying into state, local networks

      A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

    Stay Connected