National Academies Press: OpenBook

Communications Worker Credentialing Requirements (2017)

Chapter: Phase II: Identification of Effective Practices

« Previous: Chapter 2 Credential Elemental Analysis (Phase I)
Page 24
Suggested Citation:"Phase II: Identification of Effective Practices." National Academies of Sciences, Engineering, and Medicine. 2017. Communications Worker Credentialing Requirements. Washington, DC: The National Academies Press. doi: 10.17226/24794.
×
Page 24
Page 25
Suggested Citation:"Phase II: Identification of Effective Practices." National Academies of Sciences, Engineering, and Medicine. 2017. Communications Worker Credentialing Requirements. Washington, DC: The National Academies Press. doi: 10.17226/24794.
×
Page 25
Page 26
Suggested Citation:"Phase II: Identification of Effective Practices." National Academies of Sciences, Engineering, and Medicine. 2017. Communications Worker Credentialing Requirements. Washington, DC: The National Academies Press. doi: 10.17226/24794.
×
Page 26
Page 27
Suggested Citation:"Phase II: Identification of Effective Practices." National Academies of Sciences, Engineering, and Medicine. 2017. Communications Worker Credentialing Requirements. Washington, DC: The National Academies Press. doi: 10.17226/24794.
×
Page 27
Page 28
Suggested Citation:"Phase II: Identification of Effective Practices." National Academies of Sciences, Engineering, and Medicine. 2017. Communications Worker Credentialing Requirements. Washington, DC: The National Academies Press. doi: 10.17226/24794.
×
Page 28
Page 29
Suggested Citation:"Phase II: Identification of Effective Practices." National Academies of Sciences, Engineering, and Medicine. 2017. Communications Worker Credentialing Requirements. Washington, DC: The National Academies Press. doi: 10.17226/24794.
×
Page 29

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Final Report – Page 24 Task 4. Interim Report and Panel Meeting After submitting the interim report, the researchers met online with the project panel to answer questions and receive comments on the interim report. Feedback provided by the panel was incorporated into this final report. Phase II: Identification of Effective Practices Phase II of the project commenced after the research team obtained approval from the National Cooperative Highway Research Program (NCHRP) panel to proceed following an interim report meeting. Task 5 presents information extracted from the matrices created in Phase I and feedback from the subject matter experts to evaluate the identified credentials and select the available effective practices. Task 5: Identification of Effective Practices The research team used the information from the matrices created in Tasks 1, 2, and 3 as well as feedback from subject matter experts to evaluate the identified credentials. This evaluation aimed at identifying potential threats to the credential acquisition or verification systems processes (e.g., when individuals with malicious intent are able to circumvent access controls). To prevent these threats, the credentialing system must ensure (to the extent possible) that all personnel entering the incident access area are duly authorized. As noted in HMCRP Report 6: Feasibility of a Consolidated Security Credential for Persons Who Transport Hazardous Materials (Marinik et al. 2011), the prevention of threats is accomplished by two distinct processes: 1. The vetting process, which takes place during credential acquisition, ensures that the applicant exhibits no indication of malicious intent and has real and proper reasons for accessing the areas protected by the credential. 2. The communication process, with the aid of technology systems, enables the entry point personnel to verify that the current credential holder has been successfully vetted and that their certification is valid at the time of attempted access. Both processes must be performed appropriately for the communication worker credentialing system to be effective. Therefore, all communication worker credentialing processes should strive to be as thorough as possible in vetting the credential holder and as accurate as possible when communicating and validating identity (Figure 8). In this respect, the team reviewed the credential acquisition and use processes for each identified credential to ascertain effective practices. These effective practices may be used as the foundation of a guide for the credentialing of communication workers to be developed in a later effort. DHS/NIMS Credentialing The National Integration Center (NIC) under DHS oversees all aspects of NIMS credentialing, including the development of compliance criteria and implementation activities at federal, state, and local levels. The system warrants that the provided documentation for credentialing authenticates and verifies the qualifications of emergency personnel by ensuring that the selected personnel possess a minimum common level of training, experience, physical and medical fitness, and capability appropriate for a particular position.

Figur Additiona an FBI ba that the t organiza accurate specific t also a sta printed o Figure 9 rule (49 C and vess August o impleme e 8. Flow ch lly, federal ckground c hreat to thei tion can also . Federal cre o the branch nd-alone cr n it. illustrates th FR 1572.1 els were req f 2006, esta ntation of ne art illustratin (Sourc credentials ( heck. This v r information assure tha dentials ca the employ edential wit e path to iss 7) develope uired to imp blished requ w TWIC acc g the secur t e: Marinik et i.e., DHS) u ery in-depth and physic t the applica n be authen ee works fo h all of the u uing a TWI d by DHS th lement (GA irements re ess control ity credentia ransport. al. 2011, HM sually requi step assur al security i nt’s training ticated and r and the ch ser’s certific C card for tr at the owne O, 2006). T garding wor technologie ls processe CRP 6 Repo re a security es the organ s minimized , citizenship communicat ips on the P ation inform ansportation rs and oper he rule, sub ker enrollme s. The TWI Final R s for hazard rt) threat asse ization hirin . During this , and other ed with the IV/PIV-I ca ation and n workers un ators of mar mitted for e nt, card iss C-proposed eport – Pag ous material ssment, ak g the applic process, th information database rds. The car ame and ph der a propo itime facilitie valuation in uance, and rule require e 25 s in to ant e is d is oto sed s s

that each issued a card has The airpo employee AW badg 2 years, w workers. documen A similar (i.e., enro program, workers, and issui a specific conducte facility and TWIC card not been lo rt owner es s who work e. After the ith no requ The airport tation on so process tak llment, bac TSA and a with airports ng or revoki position wi d to ensure vessel unde has not sub st or stolen. Figure (Source tablishes cr in a secure initial backg irement for owner/opera und creden es place wh kground che irports typica being resp ng airport b thin a transp a proper ini r TSA have sequently be 9. Key com : www.gao.g edential req zone must round chec additional b tor designs tialing pract en an AWC ck, etc.) by lly share re onsible for e adges based ortation pro tial vetting d the capabi en identifie ponents of T ov/cgi-bin/get uirements w be authenti k is required ackground c the badge ices. badge is is the TSA. Ho sponsibility nrolling app on findings gram, addit uring the en lity to verify d by TSA as WIC progra rpt?GAO-06-9 ithin federa cated by TS , the badge hecks for co layout, but t sued, as the wever, und for the vettin licants, res . Dependin ional crimina rollment pro Final R that a worke a threat an m. 82) l regulations A prior to be needs to be ntinuously he governm same step er the Aviat g process f olving crimin g on the req l history ch cess (GAO eport – Pag r that has b d that a TW , as all airpo ing issued renewed e employed ent handles s are enforc ion Workers or airport al history ca uired acces ecks may be 2011). e 26 een IC rt an very the ed ses, s for

A compa similar st Transpor for admin credentia TWIC, or an identif certain a vetted th rison among eps are take tation Threa istering sec l. This way a TSA secu ication badg gencies suc e requesting Figure 1 the creden n to issue c t Assessme urity threat only eligible rity threat a e or endors h as state m applicants 0. Comparis tials issued redentials to nt and Cred assessment individuals ssessment ement, suc otor vehicle before it iss on of TSA an (Source: G under NIMS various tra entialing (T s for transpo are granted approval for h as an HME agencies n ues an HME d state agen AO-12-60 Re pictured in nsportation TAC) progra rtation wor TSA-related a nonfeder on a CDL. eed to ensu or TWIC. cy credenti port.) Final R Figure 10 in personnel. m under TS kers seeking credentials al governing As part of t re that TSA aling proces eport – Pag dicates tha Additionally A is respon to obtain a , such as a entity to iss he program has properl ses. e 27 t , the sible ue , y

Departm Under th standard mandato incident o are filling System ( (ROSS) s hazards an Incide (NWCG) NWCG q credentia subject m qualificat Private The cred Certificat certificati Certificat Subcomm of certific (BPT), w telecomm Based on depicting can be o assessm team’s u due to th emergen ent of the e DOI guide s for person ry requireme utside their based on p IQCS), the o oftware for emergency. nt Qualifica or National ualifications l is validate atter exper ions of the e Sector Cre entialing pro ion Subcom on. Addition ion Subcom ittee. As sh ations, such hich can evo unications (Source: htt information various rele bserved from ent along w nderstanding e fact that th cy. Interior (D line, the haz nel participa nts (US DO home unit, ersonal data fficial syste the tracking Qualified pe tion Card or Park Servic are accepte d by the DO ts in the sam mployee. dentialing cess with p mittee that e ally, working mittee, and own in Figu as broadba lve toward industry, su Fig p://www.scte collected o vant attribu the table, ith biometric that some e workers d OI) Crede ards incide ting in all-ha I, 2015). W they will use captured i m of record , mobilizatio rsonnel can “Red Card” e (NPS) Wil d in the all- I Emergenc e field of th rivate comp stablishes groups rep their actions re 11, seve nd premise advanced e ch as digital ure 11. SCTE .org/SCTE/C n effective p tes pertainin only a few a data, while agencies ha o not need ntialing nt staffing de zards eme hen DOI res the minimu n the Inciden , and the Re n, and staff only be as as per Natio dland Fire M hazards qua y Managem e position b anies such a procedures ort findings are subjec ral programs s installer (B xpert engine video engin Certificatio ertification/ ractices, a g to the vet gencies (TS most rely o ve a low se access to h velops NIM rgency resp ources are m requirem t Qualificat source Ord ing of incide signed to an nal Wildfire anagemen lification sy ent Council eing submit s SCTE or and sets sta and recomm t to approva exist unde PI) or broad ering certifi eering profe n Process. Professiona comprehens ting and com A, FEMA) r n identity ve curity thres ighly secure Final R S training a onse activiti requested to ents for the ions and Ce ering and St nt personne incident aft Coordinati t Program re stem. Final (EMC) once ted has revi iNARTE is s ndards of q endations l by the Cer r SCTE that band prem cations nee ssional. lCertificatio ive matrix w munication equire a sec rification. It hold on wor d areas in c eport – Pag nd qualifica es and valid respond to position the rtification atus System l during an er being iss ng Group quirements approval of the board o ewed the teered by a ualifications to the tification cover a var ises technic ded in the c ns.aspx) as develop processes urity threat is the resea ker credenti ase of an e 28 tion ates an y all- ued . the f for iety ian able ed . As rch als

Final Report – Page 29 Table 5. Vetting and Communication Framework for Worker Credentialing Programs Credential Type Vetting Communication Agency Sub-Agency Credential Name Qualification Issued at Completion Identity Verified Citizenship Verified Biometric Data  Collected Security Threat  Assessment Specific Job  Required to  Obtain? Cleared Electronically or by Person? Biometric Data Required Tiered Access Global Database Logically Secure Department of Homeland Security Transportation Security Administration Transportation Worker Identification Credential (TWIC) PIV/PIV-I Card     Y Both    Hazardous Material Endorsement (On CDL) Additional endorsement on CDL card    N Person Aviation Worker Credentials Badge issued by airport     Y Electronic Varies by airport  National Guard/Federal Employees Defense Biometric Identification System (DBIDS) PIV/PIV-I Card     Y Both     FEMA Emergency Management Professional Program Certificate   Y Person  NIMS Incident Command System ("Red Card") Card, and credentials in system   Y Person    Private Sector SCTE Society of Cable Telecommunications Engineers (SCTE) Certificate, entered into global database of members  N Person (via database)   iNARTE National Association of Radio and Telecommunications Engineers Inc (iNARTE) Certification Certificate, entered into global database of members  N Person (via database)   FCC Telecom/Radio Maritime Radio OperatorPermit (MROP) Permit   Y Person (via permit) General Radiotelephone Operators License (GROL) Permit   Y Person (via permit) Civilian Groups National Weather Service SKYWARN Certificate  N Person American Radio Relay League Amateur Radio Emergency Service Permit  N Person

Next: Appendix A: Additional Sources »
Communications Worker Credentialing Requirements Get This Book
×
 Communications Worker Credentialing Requirements
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

TRB's National Cooperative Highway Research Program (NCHRP) Web-Only Document 232: Communications Worker Credentialing Requirements focuses on credentialing requirements needed for communications workers to physically access disaster-impacted areas to restore damaged wireline telecommunication networks.

Under the advice of a Federal Communications Commission (FCC) panel that reviewed the impact of Hurricane Katrina on communications networks, the Warning, Alert and Response Network (WARN) Act designated cable companies and other telecommunications services as “essential service providers” for emergency management. Credentialing is a system by which identification cards or other tokens are used to authenticate a person and verify their expertise and qualifications for the purpose of access.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!