RISS Supports Federal Information Sharing Initiatives
|
|
- Aubrie Kelly
- 8 years ago
- Views:
Transcription
1 RISS Supports Federal Information Sharing Initiatives Efficient and effective sharing of information between and among criminal justice agencies and partner organizations is at the heart of today s efforts across the nation to protect public safety. In the current fiscal environment of reduced resources at all levels of government, the ability to share information remains one of the most important factors that enable communities to address their most pressing criminal justice problems in cost-effective ways. The RISS commitment to providing critical information sharing solutions is not limited to state, local, and tribal entities. RISS has always been a key player in federal information sharing initiatives that contribute to significant cost and time savings through enhanced criminal justice information sharing, both horizontally and vertically, in ways that further strengthen public and officer safety, and federal, state, local and tribal agency and staff relationships across the nation. Currently, there are more than 1,000 federal agency users of RISS services. Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) GangNet System RISS works with its federal partners to maximize criminal information sharing through proven initiatives that take advantage of the established data exchange standards and the RISS Secure Cloud (RISSNET) infrastructure. One example is the seamless sharing of gang-related information between the ATF GangNet intelligence system with RISS s RISSGang intelligence system using LEXS and RISS s Secure Cloud infrastructure to handle the secure data exchange. This secure connection allows for the simultaneous search of separate but connected criminal intelligence databases containing millions of intelligence records. The cooperation between ATF and RISS allows officers, analysts, and other authorized users to develop and analyze investigative case information with a breadth of data previously unavailable to them. ATF GangNet and RISSGang, like all RISS criminal intelligence databases and partnering agency systems, comply with the Criminal Intelligence Systems Operating Policies, 28 Code of Federal Regulations (CFR) Part 23, issued by the Office of Justice Programs, DOJ. DOJ Gang Information Exchange Project RISS is a partner in the DOJ s ongoing effort to expand the sharing of gang intelligence through the Gang Information Exchange project in which users of the Texas Gang (TXGANG) and the RISSGang systems will be able to simultaneously search records in both systems. The technology that makes this information sharing possible is the data exchange interface described in the Gang IEPD created by DOJ BJA, IIR, and the IJIS Institute in 2011, which is based on LEXS. Eventually, authorized federal law enforcement personnel will be able to take advantage of this secure data exchange between RISSGang, TXGANG, and other gang-related intelligence systems from a single search application hosted on RISSNET that federal users will access from the secure National Gang Intelligence Center (NGIC) Website. April P a g e
2 Federal Law Enforcement Training Center (FLETC) FLETC serves as an interagency law enforcement training organization for 91 Federal agencies. FLETC also provides over 100 professional development courses to state, local, and tribal, law enforcement agencies through its Electronic Learning Portal (ELP). Secure access to the FLETC ELP and its course materials are available to state, local, and tribal law enforcement agencies only through the RISS Secure Cloud via the RISSNET Portal. RISS uses GFIPM-based identity federation technology to provide this secure access to FLETC s ELP. Fusion Center Assistance and Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) RISS Direct Assistance to Fusion Centers RISS works directly with staff at various fusion centers by providing daily interaction with RISS Intelligence Analysts and, in some instances, RISS Center staff members are assigned to a fusion center. Fusion center and RISS staffs benefit from daily interactions that allows them to capitalize on each other s knowledge and experience. RISS provides technical on-site assistance to fusion centers to integrate RISS services and resources into their daily operations and coordinates the delivery of RISS services with fusion center personnel. RISS also provides the fusion center staff with on-site training, research, and topical publications. RISS s training includes courses on anti-terrorism, analytical techniques, and 28 Code of Federal Regulations (CFR) Part 23. RISS researches, drafts, and disseminates publications related to fusion centers and information sharing strategies to thousands of criminal justice professionals. Fusion Centers use RISS s Automated Trusted Information Exchange (ATIX) In times of natural disaster or terrorist actions, law enforcement, public safety, first responders, and critical infrastructure private entities need to securely communicate and share information effectively and efficiently regardless of jurisdiction. RISS provides a secure trusted environment for all entities involved in these critical events to collaborate real time through ATIX. For example, fusion center staffs use ATIX as a trusted tool to make sure all agencies in the center have the most up-to-date information available related to the events under way. Below are some examples of how RISS ATIX is being used by fusion centers to share information: Delaware Information and Analysis Center (DIAC) The DIAC is Delaware s Fusion Center. It serves as a critical component of Delaware s Homeland Security as well as criminal intelligence, critical infrastructure protection, and statewide law enforcement investigative support. The DIAC adheres to an All Crimes All Hazards approach to homeland security at the state level. This approach necessitates that the DIAC provides real time information and intelligence to those decision makers with a need and right to know in the law enforcement sector. The DIAC uses the ATIX Program s document sharing and real-time collaboration capabilities as a means of providing secure up-todate communications and information sharing among law enforcement and the critical infrastructure communities. Pennsylvania Crime Intelligence Center (PaCIC) The PaCIC is Pennsylvania s state fusion center. Through the PaCIC, trained analysts provide federal, state, municipal law enforcement officers, and the owners and operators of critical infrastructure and key April P a g e
3 resources throughout Pennsylvania with the intelligence information, investigative data, and public source information necessary to safeguard communities. Analysts also provide investigative support by analyzing complex information and collating it into intelligence summaries, organization charts, link analysis, time event analysis, and other professional products. PaCIC uses ATIX as a means of securely sharing this information between criminal justice agencies and critical infrastructure and key resources operators. Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a collaborative effort led by the U.S. Department of Justice (DOJ), Bureau of Justice Assistance, in partnership with the U.S. Department of Homeland Security, the Federal Bureau of Investigation, and state, local, tribal, and territorial law enforcement partners. An integral component of the NSI is a technology solution that enables participating agencies to share and view SAR information from various NSI Shared Spaces that have been created under the auspices of the federal Information Sharing Environment (ISE) and installed locally at participating agencies. In 2010, the SAR Search Portal (SAR SSP) Tool was created to allow authorized users to search data from all of the participating local ISE-SAR Shared Spaces. This search tool is hosted at the Institute for Intergovernmental Research (IIR) but access to the tool is provided by RISS to its users directly from the RISSNET Portal and in a federated manner to authorized law enforcement personnel via the FBI s LEO Enterprise Portal. Tennessee Fusion Center s ISE-SAR Shared Space Servers The NSI provides law enforcement with another tool to help prevent terrorism and other related criminal activity by establishing a national capacity for gathering, documenting, processing, analyzing, and sharing SAR information. All SARs with a potential terrorism nexus are loaded into the ISE-SAR Shared Spaces from existing legacy systems. The data that is stored in the local ISE-SAR Shared Spaces is periodically updated using a mechanism that replaces all data with a snapshot of current data. This approach ensures that the data in the ISE-SAR Shared Spaces is kept synchronized with data in the source systems. The Tennessee Fusion Center takes advantage of the RISS Secure Cloud infrastructure by hosting their shared space servers within the RISS Technology Support Center (RTSC). GFIPM and LEO Enterprise Portal Based upon RISS experience gained during the Trusted Credential Project, RISS was asked to participate as a charter member of the Global Federated Identity and Privilege Management (GFIPM) Demonstration Project. The project was initiated in 2005, under the auspices of Global Security Working Group. The goal of the GFIPM demonstration project was to prove that users of one federation partner system could access resources of another partner s system after authenticating only to their own system while allowing the information owners to retain complete control over access to their resources. The foundation of this project was the exchange of identity credentials based on Security Assertion Markup Language (SAML). April P a g e
4 In 2006, running in parallel with the GFIPM project, the U.S. Department of Justice (DOJ) Law Enforcement Information Sharing Program (LEISP) Trusted Broker Pilot Project was initiated to prove that users of certain federal, state, local, and tribal information systems could access resources on each other s systems without having to separately logon to each system. Again, RISS was invited to participate in this project because of its experience with federated identity technologies. RISS was the only non-federal agency participating in the LEISP Trusted Broker Pilot Project. As with the GFIPM project, SAML was the mechanism used in the LEISP project to exchange user credentials. These GFIPM and LEISP projects took slightly different approaches and included different participants, but both proved useful to their partners and resulted in the creation of two ongoing identity-based federations that actively connect critical criminal justice and public safety information with the authorized people who need it most. The GFIPM Demonstration Projects resulted in the establishment of a set of standards and procedures used to create the National Identity Exchange Federation (NIEF) and the LEISP pilot resulted in the establishment of the FBI s Law Enforcement Online (LEO) Enterprise Portal (EP). Currently, more than 13,000 users of partner systems have accessed the following resources on RISSNET through these federations: Cold Case Locator System Intelink National Criminal Intelligence Resource Center (NCIRC) National Motor Vehicle Title Information System (NMVTIS) RISS ATIX Website RISSGang Web Site RISS Officer Safety Website Federal Law Enforcement Training Center (FLETC) Electronic Learning Portal (ELP) The SAR Search Tool RISSNET Techpage RISSNET users have access to the following resources through these federations: FBI Law Enforcement Online (LEO) Website Criminal Information Sharing Alliance network (CISAnet) FBI Joint Automated Booking System (JABS) National Gang Intelligence Center (NGIC) Intelink Identity Federation Efforts In 2004, RISS foresaw a need to allow authorized users from systems outside of RISSNET to access information on RISSNET using a digital credential originating at the user s home system. To solve this problem, RISS initiated the Trusted Credential Project that resulted in RISS implementing the ability to create and accept credentials in the form of Security Assertion Markup Language (SAML) Assertions and exchange them with other systems. April P a g e
5 Information Sharing Environment (ISE) In 2004, as part of the federal Intelligence Reform and Terrorism Prevention Act, the Office of the President of the United States created the Information Sharing Environment (ISE) and established a Program Manager (PM-ISE) to oversee the organization that builds upon existing systems capabilities currently in use across the Government;... facilitates the sharing of information at and across all levels of security;... and incorporates protections for individuals' privacy and civil liberties." 1 Under the auspices of the PM-ISE, several working groups were created to facilitate information sharing across federal agencies and between federal agencies and state, local, and tribal agencies. One such group is the Assured Sensitive But Unclassified (SBU) Interoperability Working Group (SBU WG) composed of the following partners: FBI CJIS, Law Enforcement Online (LEO); DHS, Homeland Security Information Network (HSIN); NSA Intelink; and RISS, RISSNET. RISS represents state and local priority interests as the only non-federal participant in this working group. RISS is also the only non-federal participant currently involved in the Data Aggregation Working Group (DA WG), Identity Federations Coordination (IFC) Working Group, and Information Integration Sub- Committee (IISC) under the auspices of the Information Sharing and Access Interagency Policy Committee (ISA-IPC). In 2012, RISS led an effort by the SBU WG partners to create a National Information Exchange Model (NIEM) Information Exchange Package Document (IEPD) to enhance information-sharing between all law enforcement and homeland security agencies at all levels of government through security-trimmed federated search. This was the first step toward implementing a search capability that will provide law enforcement and homeland security personnel with a tool that will allow them to find the critical information they need more efficiently by allowing them to search across multiple SBU systems at one time without having to go to each target system. RISS and HSIN are currently working towards implementing this search capability between their two systems. Once implemented, users from either system will be able to search both systems for critical information. Information about the user s identity, including their role (e.g., sworn law enforcement officer, public safety officer, or having received 28 CFR Part 23 training) is transmitted with the search request via a SAML Assertion. The receiving system can then provide a response that includes all of the information the searcher is authorized to access. This is accomplished by checking the user s identity attributes in the SAML Assertion against the data that has been previously tagged for various levels of authorization (e.g., Law Enforcement Sensitive (LES), Sworn Law Officer (SLO), or Sworn Public Officer (SPO)). Most current federated search implementations determine what information a user can receive at a lower system level, thus denying information to anyone who does not meet a higher authorization level for any higher-level piece of information in the system. This attribute-based security trimmed federated search represents the next step toward fulfilling the goal of the President s recently-released National Strategy for Information Sharing and Safeguarding by enhancing the ability to share the right information, with the right people, at the right time 2 1 For more information on the ISE, please see: 2 See: April P a g e
6 More recently the PM-ISE initiated a project that will extend the Backend Attribute Exchange (BAE) model currently used within the federal government to include federated identity-based information sharing with state, local, and tribal systems. RISS has been asked to participate in this effort along with the Texas Department of Public Safety (DPS) and the Institute for Intergovernmental Research (IIR). During this project, Texas DPS users will access RISS s intelligence system, RISSIntel. Access to RISSIntel requires that a user be certified as having been trained in 28 CFR Part 23, among other requirements. The Texas DPS system does not store information about which users have received 28 CFR training, but IIR does. In this scenario, IIR will establish BAE capability for providing the 28 CFR Attribute. On behalf of its users that want to access RISSIntel, the Texas DPS will: 1) collect all of the required user attributes from its own user store, 2) access the 28 CFR BAE at IIR and 3) include the 28 CFR Attribute in the SAML Assertion that it sends to RISS. RISS will allow the user to access RISSIntel if all of the required attributes are present and correct. This project represents the critical role that RISS continues to play in information sharing among and between law enforcement and homeland security agencies at all levels of government. INTERPOL The INTERPOL I-24/7 global police communications system was created to connect law enforcement officers in all member countries. It enables authorized users to share sensitive and urgent police information with their counterparts around the globe, 24 hours a day, 365 days a year. I-24/7 is the network that enables investigators to access INTERPOL's range of criminal databases. Authorized users can search and cross-check data in a matter of seconds, with direct access to databases on suspected criminals or wanted persons, stolen and lost travel documents, stolen motor vehicles, fingerprints, DNA profiles, stolen administrative documents, and stolen works of art. INTERPOL specifically authorizes individual federal, state, and local law enforcement and criminal analysts to access the Interpol I-24/7 resource through the RISS Secure Cloud. Medicaid Fraud Control Units (MFCU) and National Association of Medicaid Fraud Control Units (NAMFCU) Medicaid Fraud Control Units (MFCU), created by Congress in 1977, are federal and state-funded law enforcement entities that investigate and prosecute violations of state law pertaining to fraud in the administration of the Medicaid program. In addition, the MFCUs are required to review complaints of resident abuse or neglect in nursing homes and other health care facilities. The National Association of Medicaid Fraud Control Units (NAMFCU) is a professional association created to provide training, promote communication and interstate cooperation, provide for the exchange of information, and educate the public about the work of the Medicaid Fraud Control Unit (MFCU) program. The RISS Secure Cloud s Software as a Service (SaaS) is used by the MFCUs to provide a private, secure MFCU Investigators collaboration site where investigators from around the country can conduct secure on-line information-sharing discussions and can post and share documents about their investigations, such as provider services resources, wanted persons, discussion forums, and training documents and events. April P a g e
7 National Criminal Intelligence Resource Center (NCIRC) The National Criminal Intelligence Resource Center (NCIRC) is sponsored by the U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Assistance (BJA). The NCIRC is a secure Website that provides law enforcement and homeland security personnel with a centralized location to access resources needed to develop, analyze, and share criminal intelligence among all levels of government. NCIRC provides many tools for law enforcement, including access to the 28 CFR online training and information regarding the Nationwide Suspicious Activity Report (SAR) Initiative (NSI), both of which are hosted at IIR. The secure Law Enforcement Sensitive (LES) NCIRC Website is available to RISSNET users directly via the RISSNET Portal and via federation to users from the FBI s LEO Enterprise Portal. National Identity Crimes Law Enforcement (NICLE) Network Identity-related crimes continue to increase in number each year. The individuals involved in committing identity-related crimes are aware of the inner workings of our legal system and exploit jurisdictional weaknesses to avoid or lessen prosecution. Often multiple law enforcement entities investigate the same suspect or groups of suspects unaware of a parallel investigation being conducted. This inefficient use of law enforcement resources costs the criminal justice system time and money, provides additional frustration to victims and may result in lesser penalties for the criminal. To address this concern the United States Postal Inspection Service and the United States Department of Justice jointly developed the National Identity Crimes Law Enforcement network, NICLE. NICLE is an application that collects and organizes identity crime related information concerning victims, suspects, and investigators. Available to law enforcement, NICLE provides a link that crosses jurisdictional boundaries allowing investigative efforts to be more efficient and more effective resulting in more cohesive prosecutions and more appropriate penalties for criminals. Law enforcement can access the NICLE Dashboard via the RISSNET Portal. National Motor Vehicle Title Information System (NMVTIS) NMVTIS is an electronic system designed to protect prospective buyers of used vehicles from having vehicle histories concealed from them. Created by federal law, NMVTIS is the only publicly-available system in the U.S. that requires all insurance carriers, auto recyclers, junk and salvage yards, and states to report vehicle history information. Prospective buyers of used vehicles can request vehicle history information for a nominal fee through NMVTIS by selecting an approved service provider at In addition to the publicly-available system, the Bureau of Justice Assistance (BJA), in partnership with the American Association of Motor Vehicle Administrators (AAMVA), created the NMVTIS Law Enforcement Access Tool to provide law enforcement officers with the information necessary to investigate crimes associated with motor vehicles. This is a law enforcement sensitive (LES) site that is separate from the publicly available NMVTIS Website. NMVTIS is an asset to law enforcement agencies across the country as investigations have shown that criminals involved in domestic auto theft enterprises often perpetrate violent crimes, such as homicide, drug and human trafficking, and domestic terrorism. Law enforcement can access the NMVTIS Law Enforcement Access Tool via the RISSNET Portal or via federation to the RISSNET Portal from the LEO EP. Another law enforcement resource initiated by NMVTIS and hosted on the RISSNET Portal is a private, secure Vehicle Theft Investigators collaboration site where investigators can conduct secure on-line information-sharing discussions and can post and share documents about their investigations, such as best practices and procedures, criminal methods, and subjects of interest. April P a g e
8 National Railroad Trespasser Database The National Railroad Trespasser Database is a national database that was funded by the Federal Railroad Administration (FRA), accessible to railroad police departments and local, state, and federal law enforcement partners, to accumulate and analyze information pertaining to unauthorized persons found on railroad property. The National Railroad Trespasser Database is an instantiation of the RISS National Criminal Intelligence Database specifically customized to accommodate the needs of railroad police departments. The National Railroad Trespasser Database is available to authorized users via the RISSNET Portal. National RISS Data Exchange Initiatives Beginning in 2000 with the creation of the first XML-based data exchange between intelligence systems (RISS Data Exchange Specification (RISSDES)), RISS has been a critical partner in developing and refining the mechanisms for securely exchanging critical information between criminal justice agencies at all levels of government. Working with the LegalXML initiative in 2002, RISS used the experience gained from developing RISSDES to help develop the Reconciliation Data Dictionary (RDD). RISS then worked with the Global Justice Information Sharing Initiative (Global) to develop the Global Justice XML Data Model (GJXDM). Working with the U.S. Department of Justice (DOJ) and the U. S. Department of Homeland Security (DHS), RISS lent their expertise to the committee that created the National Information Exchange Model (NIEM). RISS also participated in the establishment of the Logical Entity exchange Specification (LEXS). LEXS is a family of NIEM-conformant Information Exchange Package Documents (IEPDs) that provide a framework for creating data exchange specifications that go beyond the definition of data objects to encapsulate a common understanding of the messages that will contain the data. National Virtual Pointer System (NVPS) In 2004, the National Virtual Pointer System (NVPS) was developed in cooperation between the DEA, HIDTA, RISS, and Nlets. The NVPS is a target/subject deconfliction system that accomplishes automated federated inquiries from one participating NVPS system to other participating systems when data is entered into one of the participating systems and the appropriate criteria is met to initiate an automated query. The NVPS Message Hub was built by RISS and is hosted on the Secure RISSNET Cloud. The Midwest and South Florida HIDTAs, the Missouri Statewide Police Intelligence Network (MoSPIN), and the U.S. DEA s National Drug Pointer Index system (NDPIX) began exchanging information using NVPS. In 2005 and 2006, the New England, Appalachia, South Texas, and Chicago HIDTAs became NVPS participants. In 2007, the Atlanta HIDTA; in 2010, the Washington/Baltimore HIDTA; and from 2009 to 2011, the six RISS Centers also became NVPS participants. National White Collar Crime Center (NW3C) The mission of the National White Collar Crime Center (NW3C) is to provide training, investigative support, and research to agencies and entities involved in the prevention, investigation, and prosecution of economic and high-tech crime. A non-profit membership organization, NW3C has been continuously funded through competitive grants for over three decades. NW3C membership consists of law enforcement agencies from all 50 states and four continents. Law enforcement accesses the NW3C Search Tool via the RISSNET Portal. April P a g e
9 RISS Provides Secure Access to Critical National Information Resources The RISSNET Portal provides users with a streamlined log-on process, ease of access to resources, and enhanced search capabilities to RISSNET and partner resources. The RISSNET Portal aggregates RISSNET content and applications into a browser view. The RISSNET Portal is capable of personalizing the aggregation and presentation of each user s browser view based on user identities, roles, and preferences. Many of the applications and resources available to authorized users are provided and managed by federal government entities. RISS s Secure Cloud Software as a Service (SaaS) Software as a Service (SaaS) makes software applications available to consumers via thin clients (e.g., web browsers) or some other client interface. The applications run within RISS s service provider infrastructure and the application user has no control over that infrastructure environment. RISS s Secure Cloud Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) allows the consumer to deploy their own applications and services created using their own software platforms. RISS, as a secure cloud service provider, supplies basic infrastructure (e.g., servers, network, and storage). RISS s Secure Cloud IaaS includes: A secure facility with backup generator Rack space for client-owned equipment Computing power with physical and virtual servers Network bandwidth Failover to redundant servers and Storage Area Network (SAN) Offsite disaster recovery United States Attorney General s Law Enforcement Officer Safety Initiative/RISSafe and the RISS Officer Safety Website The RISS Officer Safety Event Deconfliction System (RISSafe) and the RISS Officer Safety Website are two important components of the U.S. Attorney General s Law Enforcement Officer Safety Initiative. RISSafe assists thousands of law enforcement agencies by proactively identifying potential conflicts between operations and events conducted by agencies and officers. By identifying these conflicts and informing the appropriate partners, RISSafe helps officers avoid harmful and dangerous situations and prevents interference with each other s cases. RISSafe also increases communications and supports case resolution. As part of the Preventing Violence Against Law Enforcement and Ensuring Officer Resilience and Survivability (VALOR), which is the Office of Justice Program s (OJP), Bureau of Justice Assistance s (BJA) national training initiative to improve the safety of our nation s officers, RISS developed the RISS Officer Safety Website. This site serves as a secure one stop shop for law enforcement to access all types of officer safety-related information, including awareness materials, videos, information on armed and dangerous subject, information on concealment methods, and a training calendar. April P a g e
10 United States Attorney s Office (USAO) Project Safe Neighborhoods Mapping and Analysis Program (PSN MAP) The Eastern District of Pennsylvania U.S. Attorney's Office (USAO) includes Philadelphia and eight other counties: Berks, Bucks, Chester, Delaware, Lancaster, Lehigh, Montgomery and Northampton, and is at a geographic disadvantage when it comes to crime. It's located in the southeastern part of the state, and is increasingly attractive to the criminal element because a network of major thoroughfares connects it to New York City, Philadelphia, and Baltimore. In 2003, the EOUSA developed a system, called Project Safe Neighborhoods Mapping and Analysis Program (PSN MAP) that enables law enforcement users to gain a geographical perspective on firearm incidents and violent crime in their own jurisdiction, bordering jurisdictions, and the entire Eastern District of Pennsylvania. The program goals are: (1) to increase the capacity of PSN Task Forces to design data driven strategies that produce measurable decreases in firearm-related violent crime; and (2) to improve the long term ability of federal, state, and local partners to work together to understand, prosecute, and prevent firearm related violent crime within their jurisdictions. PSN MAP utilizes RISSNET to provide law enforcement agencies on all levels in the Eastern District of Pennsylvania with easy-to-use, web-deployed mapping tools to gain a visual perspective on crime incidents in selected geographic areas. PSN MAP maximizes data sharing in the region by identifying perpetrators who have committed crimes in multiple jurisdictions so cases may be effectively charged and prosecuted in federal court. Information on all known or suspected individuals involved in these crimes are entered into RISSIntel, further enhancing the sharing of intelligence beyond the region and fostering the coordination of investigative efforts. United States Secret Service s Targeted Violence Information Sharing System (TAVISS) TAVISS is a federal government system administered and maintained by the United States Secret Service. TAVISS is the first centralized database containing a repository of names of subjects with a known or suspected, adverse or unusual direction of interest towards local, state, and/or federal public officials. Member agencies are required to share data from their protective intelligence databases to be active participants. Law enforcement accesses TAVISS via the RISSNET Portal. April P a g e
GFIPM Supporting all Levels of Government Toward the Holy Grail of Single Sign-on
GFIPM Supporting all Levels of Government Toward the Holy Grail of Single Sign-on Presenter(s): John Ruegg, DOJ Global Security Working Group Mark Phipps, CJIS/FBI Law Enforcement Online Kevin Heald, PM-ISE
More informationPHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17
PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 Issued Date:01-29-15 Effective Date:01-29-15 Updated Date: SUBJECT: DELAWARE VALLEY INTELLIGENCE CENTER UNIT 1. BACKGROUND A. The Delaware Valley Intelligence
More informationFighting Crime and Terrorism through Data Integration
Fighting Crime and Terrorism through Data Integration By Neil Kurlander, Chief of Police (Retired), Maryland Heights, Missouri, and Vice President, Public Sector Solutions, Asynchrony Solutions Inc., Saint
More informationGFIPM & NIEF Single Sign-on Supporting all Levels of Government
GFIPM & NIEF Single Sign-on Supporting all Levels of Government Presenter: John Ruegg, Director LA County Information Systems Advisory Body (ISAB) & Chair, Global Federated ID & Privilege Management (GFIPM)
More informationOverview of Current Criminal Justice Information Systems
Overview of Current Criminal Justice Information Systems by James X. Dempsey Center for Democracy & Technology www.cdt.org Criminal justice information systems can be divided roughly into two categories:
More informationLaw Enforcement Consolidation Task Force INVESTIGATIONS TEAM REPORT
Law Enforcement Consolidation Task Force INVESTIGATIONS TEAM REPORT OCTOBER 2011 October 2011 CONTENTS EXECUTIVE SUMMARY... 1 BACKGROUND... 3 MISSION STATEMENTS... 4 MAJOR LAW ENFORCEMENT FUNCTIONS...
More informationArizona Counter Terrorism Information Center
Arizona Counter Terrorism Information Center VICTORY THROUGH COOPERATION USDOJ/BJA Regional Information Sharing Conference Norman Beasley Maricopa County Sheriff s Office The Creation of ACTIC 911 Commission
More informationDepartment of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
More informationEstablishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
More informationPUBLIC SAFETY ACTION PLAN. Prepared for Governor Haslam by Subcabinet Working Group
PUBLIC SAFETY ACTION PLAN Prepared for Governor Haslam by Subcabinet Working Group JANUARY 2012 Table of Contents Subcabinet working group makeup and input Two-fold mission of the group Summary of findings
More informationJustice Information Sharing Initiatives
Justice Information Sharing Initiatives A White Paper Prepared for the Attorney General s Advisory Committee of United States Attorneys by the Office of Justice Programs October, 2004 Executive Summary
More informationFusion Center Guidelines
Fusion Center Guidelines Developing and Sharing Information and Intelligence in a New Era Guidelines for Establishing and Operating Fusion Centers at the Local, State, and Federal Levels Law Enforcement
More informationDavid L. Carter, Ph.D. School of Criminal Justice Michigan State University
David L. Carter, Ph.D. School of Criminal Justice Michigan State University Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies November 2004 David L. Carter, Ph.D.
More informationGAO INFORMATION SHARING. Additional Actions Could Help Ensure That Efforts to Share Terrorism-Related Suspicious Activity Reports Are Effective
GAO United States Government Accountability Office Report to Congressional Requesters March 2013 INFORMATION SHARING Additional Actions Could Help Ensure That Efforts to Share Terrorism-Related Suspicious
More informationFusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers
Fusion Center Technology Resources Road Map: Elements of an Enterprise for State and Major Urban Area Fusion Centers General Overview The function of a fusion center is to provide a collection, analysis,
More information12 NCAC 04H.0102 DEFINITIONS As used in this Chapter: (1) "ACIIS" means Canada's Automated Criminal Intelligence and Information System.
12 NCAC 04H.0102 DEFINITIONS As used in this Chapter: (1) "ACIIS" means Canada's Automated Criminal Intelligence and Information System. (2) "Administration of criminal justice" means the: (a) detection
More informationGAO INFORMATION SHARING. Agencies Could Better Coordinate to Reduce Overlap in Field-Based Activities. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters April 2013 INFORMATION SHARING Agencies Could Better Coordinate to Reduce Overlap in Field-Based Activities GAO-13-471
More informationDavid L. Carter, Ph.D. School of Criminal Justice Michigan State University
David L. Carter, Ph.D. School of Criminal Justice Michigan State University Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies November 2004 David L. Carter, Ph.D.
More informationFACT SHEET: PROJECT SAFE CHILDHOOD
FACT SHEET: PROJECT SAFE CHILDHOOD Project Safe Childhood Project Safe Childhood is a Department of Justice initiative launched in 2006 to combat the proliferation of technology-facilitated crimes involving
More informationThe Department of the Treasury established the Financial Crimes
Appendix A Financial Crimes Enforcement Network Programs The Department of the Treasury established the Financial Crimes Enforcement Network in April 1990. 33 FinCEN s original mission was to establish
More informationThe IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova
The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova Realize the Power of Information Non-profit consortium representing leading companies that supply
More informationExecutive Summary Overview
Executive Summary Overview Formalized during a Special Session on Crime in 1995, the Commonwealth of Pennsylvania s Justice Network (JNET) is a secure virtual system for the sharing of public safety and
More informationThe structure and organization of the Fusion Center takes its direction from four key documents, they are:
The structure and organization of the Fusion Center takes its direction from four key documents, they are: Northern Operational Office MISSION We incorporate information and utilize relationships formed
More informationTEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
More informationNational Strategy. for the National Network of Fusion Centers. July 2014
2014 2017 National Strategy for the National Network of Fusion Centers July 2014 The development of the 2014 2017 National Strategy for the National Network of Fusion Centers was a collaborative effort,
More informationThese are just two examples of the opportunities and privacy risks involved in U.S. fusion centers.
This article was published in the May 2008 issue of The Privacy Advisor. The Privacy Advisor is a membership benefit of the International Association of Privacy Professionals (IAPP). If you are interested
More informationMiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network
Michigan State Police Criminal Justice Information Center (517) 336-6574 June 2006 Software Systems and Services Available The sharing of information in a highly secure environment has become increasingly
More informationHomeland Security Intelligence Guide for Fire Chiefs Table of Contents
Homeland Security Intelligence Guide for Fire Chiefs Table of Contents Introduction 3 Chapter 1 4 Fire Service Intelligence Enterprise (FSIE) 6 Chapter 2 7 Partnerships 7 Fusion Centers 7 Joint Terrorism
More informationANNUAL PRIVACY REPORT
THE CHIEF PRIVACY AND CIVIL LIBERTIES OFFICER AND THE OFFICE OF PRIVACY AND CIVIL LIBERTIES ANNUAL PRIVACY REPORT JANUARY 1, 2012-SEPTEMBER 30, 2013 United States Department of Justice Message from the
More informationThe following states were recommended and awarded grants:
The following states were recommended and awarded grants: ARIZONA Arizona Criminal Justice Commission Amount: $230,000 The Arizona Criminal Justice Commission will use the funds for three projects: Juvenile
More informationTo do Justice, as no one is above the Law nor beneath its protection.
Michael L. Ramsey, District Attorney District Attorney Department Summary Mission Statement To do Justice, as no one is above the Law nor beneath its protection. Department Description and Key Issues The
More informationU.S. Department of Homeland Security STATEMENT
U.S. Department of Homeland Security STATEMENT OF PAUL M. KILCOYNE DEPUTY ASSISTANT DIRECTOR OF INVESTIGATIVE SERVICES DIVISION U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT U.S. DEPARTMENT OF HOMELAND SECURITY
More informationSEARCH. The Global Information Sharing Toolkit: Update on Key Information Sharing Standards. Scott Came Mo West Andrew Owen
SEARCH The Global Information Sharing Toolkit: Update on Key Information Sharing Standards Scott Came Mo West Andrew Owen Overview Global Standards Data Architecture National Information Exchange Model
More informationFindings and Recommendations of the Suspicious Activity Report (SAR) Support and Implementation Project
Acknowledgements The Suspicious Activity Report (SAR) Support and Implementation Project appreciates the support and guidance of the project sponsors: the Bureau of Justice Assistance (BJA), U.S. Department
More informationFEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft
FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity
More informationDHS Department of Homeland Security
Page 1 of 5 Fact Sheet: Homeland Security Operations Center (HSOC) The Homeland Security Operations Center (HSOC) serves as the nation s nerve center for information sharing and domestic incident management
More informationCommon Competencies for State, Local, and Tribal Intelligence Analysts
DEPARTMENT OF JUSTICE United States Department of Justice Common Competencies for State, Local, and Tribal Intelligence Analysts June 2010 A Companion Document to the Minimum Criminal Intelligence Training
More informationTHE DEPARTMENT OF JUSTICE S EFFORTS TO COMBAT IDENTITY THEFT. U.S. Department of Justice Office of the Inspector General Audit Division
THE DEPARTMENT OF JUSTICE S EFFORTS TO COMBAT IDENTITY THEFT U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 10-21 March 2010 THE DEPARTMENT OF JUSTICE S EFFORTS
More informationOffice of Justice Programs (OJP), Bureau of Justice Assistance (BJA) National Governors Association Center for Best Practices (NGAC)
This document contains a description of each project and a status update as of January 2003. ARIZONA Award To: Arizona Criminal Justice Commission Amount: $230,000 Website: www.acjc.state.az.us The Arizona
More informationSenate Bill No. 38 Committee on Transportation and Homeland Security
Senate Bill No. 38 Committee on Transportation and Homeland Security CHAPTER... AN ACT relating to criminal records; creating the Records and Technology Division of the Department of Public Safety; enumerating
More informationFederal Bureau of Investigation s Integrity and Compliance Program
Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established
More informationSummary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum
Summary of Privacy and Data Security Bills- 112 th Congress Prepared for September 15, 2011 CT Privacy Forum GEOLOCATION TRACKING The Location Privacy Protection Act of 2011 (S. 1223)- introduced by s
More informationUsing Data to Inform Evidence-Based Decision Making. January 8, 2013
Using Data to Inform Evidence-Based Decision Making January 8, 2013 1 New York State Criminal Justice System 500 local police agencies arrest 600,000 annually. 62 locally elected county district attorneys
More informationPreservation for a Safer World
Preservation and Archiving Special Interest Group (PASIG) Preservation for a Safer World Hong-Eng Koh Senior Director (Global Lead) Justice & Public Safety A Very Fragmented World
More information1 DOCUMENT PURPOSE... 2 RECOMMENDED PRINCIPLES...
Table of Contents ACKNOWLEDGEMENTS... i BACKGROUND... 1 DOCUMENT PURPOSE... 2 RECOMMENDED PRINCIPLES... 3 I. FEDERATED ICAM STRATEGY... 3 II. MODULARIZATION AND LAYERING OF POLICIES... 4 III. FAVOR DECENTRALIZED
More informationStatement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)
Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,
More informationThe Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland.
The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations State of Maryland June 1, 2011 1 Section B. The Criminal Justice Dashboard (Dashboard) is
More informationProgram C: Criminal Law and Medicaid Fraud
Program C: Criminal Law and Medicaid Fraud Program Authorization: La. Constitution, Article IV, Section 8; R.S. 36:701(D); R.S. 36:704(E) and (F); R.S. 13:4448; R.S. 49:251-253 and 257(B); R.S. 15:1311(B);
More informationHOMELAND SECURITY & INTELLIGENCE (HSI) SECTION
HOMELAND SECURITY & INTELLIGENCE (HSI) SECTION INDEX CODE: 605 EFFECTIVE DATE: 10-03-14 Contents: I. Policy II. Purpose III. Definitions IV. Administration V. Operations VI. Terrorism & Suspicious Activity
More informationFive-Year Strategic Plan
U.S. Department of Education Office of Inspector General Five-Year Strategic Plan Fiscal Years 2014 2018 Promoting the efficiency, effectiveness, and integrity of the Department s programs and operations
More informationCYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
More informationTESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE
TESTIMONY OF ZOË BAIRD, PRESIDENT, MARKLE FOUNDATION CHAIRMAN, TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Select Committee on Homeland Security U.S. House of Representatives "Information Sharing
More informationTraining Courses Catalog 2015
Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction
More informationPurpose of the Governor s strategy. Guiding Principles
Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose
More informationNotice of Privacy Practices
Notice of Privacy Practices This notice describes how medical information about you may be used and disclosed and how you can get access to this information. Please review it carefully. This Notice of
More informationcase study National Law Enforcement Telecommunications System The International Justice and Public Safety Information Sharing Network Summary
The Computerworld Honors Program Phoenix, Arizona, United States Government and Non-Profit Summary Nlets, the International Justice and, is the primary interstate law-enforcement network in the United
More informationREPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM
REPORT TO CONGRESS ON THE IMPLEMENTATION OF THE FY 2003 INTEROPERABLE COMMUNICATIONS EQUIPMENT GRANT PROGRAM Department of Homeland Security Emergency Preparedness & Response Directorate May 2003 Table
More informationDallas Police Department Fusion Center Standard Operating Procedure 300.00 MOSAIC NSI PRIVACY-CR-CL DAVID O. BROWN CHIEF OF POLICE
Fusion Center SOP 1 9-23-2013 Dallas Police Department Fusion Center 300.00 DALLAS POLICE DEPARTMENT METRO OPERATIONS SUPPORT AND ANALYTICAL INTELLIGENCE CENTER Nationwide Suspicious Activity Report (SAR)
More informationGAO HOMELAND SECURITY. Federal Efforts Are Helping to Alleviate Some Challenges Encountered by State and Local Information Fusion Centers
GAO United States Government Accountability Office Report to Congressional Committees October 2007 HOMELAND SECURITY Federal Efforts Are Helping to Alleviate Some Challenges Encountered by State and Local
More informationProgram C: Criminal Law and Medicaid Fraud
Printed: //003 4:54 PM Program C: Criminal Law and Medicaid Fraud Unless otherwise indicated, all objectives are to be accomplished during or by the end of FY 003-004. Objectives may be key or supporting
More informationFUGITIVE INVESTIGATIONS
Directives Home Paqe >> T* >>Fusitive Investisations FUGITIVE INVESTIGATIONS Criminal Investigations 8.11 Organized Crime Drug Enforcement Task Force (OCDEFT) A. Policy: The USMS OCDETF Program is part
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationNOC Patriot Report Database
for the NOC Patriot Report Database December 7, 2010 Contact Point Ashley Tyler Department of Homeland Security Office of Operations and Coordination and Planning Reviewing Official Mary Ellen Callahan
More informationProposal: Illinois Justice Network Portal
Proposal: Illinois Justice Network Portal Summary This proposal addresses the strategic issues that have been identified as being crucial to criminal justice information sharing and recommends the establishment
More informationLegislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
More informationAND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified
CYBER THREATS AND RESPONSE Continuity Insights Conference Chicago June 18-19, 2013 Unclassified OBJECTIVES Why it is important Threats, players, and response FBI s Next Generation Cyber Government and
More informationColorado Integrated Criminal Justice Information System (CICJIS)
2011 NASCIO RECOGNITION AWARDS NOMINATION Colorado Integrated Criminal Justice Information System (CICJIS) Award Category Data, Information and Knowledge Management State Colorado 2011 NASCIO Recognition
More informationPerformance Measures Definitions Guide
Performance Measures Definitions Guide Measuring the Performance of the National Network of Fusion Centers April 2014 Version 1.0 Performance Measures Definitions Guide Measuring the Performance of the
More informationHarold Rogers Prescription Drug Monitoring Program
Harold Rogers Prescription Drug Monitoring Program 19 th National Conference on Pharmaceutical and Chemical Diversion June 16-17, 2010 Harold Rogers Prescription Drug Monitoring Program Since fiscal year
More informationU.S. Department of Justice. Becoming A. Special Agent. U.S. Department of Justice Office of the Inspector General INVESTIGATIONS DIVISION
U.S. Department of Justice Office of the Inspector General Becoming A Special Agent INVESTIGATIONS DIVISION OFFICE OF THE INSPECTOR GENERAL U.S. Department of Justice The OIG plays an integral role in
More informationGAO FOOD ASSISTANCE. Reducing Food Stamp Benefit Overpayments and Trafficking
GAO United States General Accounting Office Testimony Before the Subcommittee on Department Operations, Nutrition, and Foreign Agriculture, Committee on Agriculture, House of Representatives For Release
More informationFINAL REPORT: INFORMATION SHARING ENVIRONMENT (ISE)- SUSPICIOUS ACTIVITY REPORTING (SAR) EVALUATION ENVIRONMENT JANUARY 2010
Page ii FINAL REPORT: INFORMATION SHARING ENVIRONMENT (ISE)- SUSPICIOUS ACTIVITY REPORTING (SAR) EVALUATION ENVIRONMENT JANUARY 2010 This project was supported by Grant No. 2008-DD-BX-K480 awarded by the
More informationCyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
More informationAgency Request Budget. Criminal Justice Division
Criminal Justice Division Chief Counsel Positions: 1 FTE: 1.00 Organized Crime Section Positions: 8 FTE: 8.00 Special Investigations and Prosecutions Section Administration Positions: 12 FTE: 11.56 Criminal
More informationCONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT
CONSOLIDATED RECORDS MANAGEMENT SYSTEM (CRMS) USER AGREEMENT I. PURPOSE STATEMENT The TENNESSEE FUSION CENTER (TFC) is an initiative of the Tennessee Bureau of Investigation (TBI) and the Department of
More informationComplaint Investigations of Minnesota Health Care Facilities
Complaint Investigations of Minnesota Health Care Facilities Report to the Minnesota Legislature explaining the investigative process and summarizing investigations from State Fiscal Year 2009 through
More informationDepartment of Homeland Security Office of Inspector General. DHS' Role in State and Local Fusion Centers Is Evolving
Department of Homeland Security Office of Inspector General DHS' Role in State and Local Fusion Centers Is Evolving OIG-09-12 December 2008 Office of Inspector General U.S. Department of Homeland Security
More informationProgram Narrative - Attachment 2. The Community Law Enforcement and Recovery (CLEAR) Program began in 1997 as an
Attachment 1 Program Narrative - Attachment 2 Community Law Enforcement and Recovery (CLEAR) Program The Community Law Enforcement and Recovery (CLEAR) Program began in 1997 as an innovative City of Los
More informationHSIN R3 User Accounts: Manual Identity Proofing Process
for the HSIN R3 User Accounts: Manual Identity Proofing Process DHS/OPS/PIA-008(a) January 15, 2013 Contact Point James Lanoue DHS Operations HSIN Program Management Office (202) 282-9580 Reviewing Official
More informationTips To Prepare. Audits/Investigations. For Prosecution
Tips To Prepare Audits/Investigations For Prosecution Presented By: Assistant State Attorney Sheri Maxim Thirteenth Judicial System Hillsborough County Florida Maxim_s@sao13th.com 813-274-1324 Topics of
More informationSAA Strategic Planning: Stakeholder Engagement Strategies
SAA Strategic Planning: Stakeholder Engagement Strategies OUTREACH SAAs have enhanced their outreach to non-traditional partners: public defense, state health and human service agencies, state and local
More informationFISCAL YEAR 2011 HOMELAND SECURITY GRANT PROGRAM MAY 2011 GUIDANCE AND APPLICATION KIT SECTION I APPLICATION AND REVIEW INFORMATION
U. S. D E P A R T M E N T O F H O M E L A N D S E C U R I T Y FISCAL YEAR 2011 HOMELAND SECURITY GRANT PROGRAM GUIDANCE AND APPLICATION KIT SECTION I APPLICATION AND REVIEW INFORMATION MAY 2011 U.S. DEPARTMENT
More informationMyths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
More informationSTATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE
STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOMELAND SECURITY COMMITTEE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE AND SUBCOMITTEE ON
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
More informationJohn Keel, CPA State Auditor Medicaid Fraud Control Activities at the Office of the Attorney General
John Keel, CPA State Auditor An Audit Report on Medicaid Fraud Control Activities at the Office of the Attorney General Report No. 08-040 An Audit Report on Medicaid Fraud Control Activities at the Office
More informationIN THE WAR ON TERRORISM
THURSDAY, SEPTEMBER 19, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET OVERVIEW OF INFORMATION SHARING INITIATIVES IN THE WAR ON TERRORISM Information Is the Best Friend of Prevention...
More information2013 2016 STRATEGIC PLAN
2013 2016 STRATEGIC PLAN Minnesota Bureau of Criminal Apprehension Contents Introduction... 1 DPS Mission BCA Mission BCA Vision BCA Values Agency History and Staffing...3 Organizational Chart Staff /
More informationSTATEMENT OF JENNIFER SHASKY SENIOR COUNSEL TO THE DEPUTY ATTORNEY GENERAL BEFORE THE
STATEMENT OF JENNIFER SHASKY SENIOR COUNSEL TO THE DEPUTY ATTORNEY GENERAL BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE ENTITLED BUSINESS FORMATION AND FINANCIAL
More informationFederal Law Enforcement Intelligence
Federal Law Enforcement Intelligence 11 CHAPTER ELEVEN Federal Law Enforcement Intelligence Many federal agencies have reengineered their intelligence function since 9/11. Intelligence products have been
More informationExecutive Office of the President Office of National Drug Control Policy. High Intensity Drug Trafficking Areas Program Report to Congress
Executive Office of the President Office of National Drug Control Policy High Intensity Drug Trafficking Areas Program Report to Congress June 2010 TABLE OF CONTENTS Executive Summary.. 1 Strategic Objectives.......
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationCyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems
Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department
More informationLaw Enforcement Justice Information System
Law Enforcement Justice Information System Mike Spirito LEJIS Steering Committee Chairman Kevin Switala LEJIS Project Manager LEJIS Overview Introduction of the Problem Project Goals/Approach Status Update
More informationGFIPM Trusted Identity Broker Onboarding Guide Draft Version 1.0 June 2012 Table of Contents
Table of Contents Acknowledgements... ii 1. Introduction... 1 2. Purpose of This Document... 1 3. Background: Interfederation Information Sharing in GFIPM... 2 3.1 Trusted Identity Broker Organization...
More informationA FBI Program, Resource, and Service Guide for Chiefs and Sheriffs
A FBI Program, Resource, and Service Guide for Chiefs and Sheriffs The most effective weapon against crime is cooperation. The efforts of all law enforcement agencies with the support and understanding
More informationSouth Carolina Law Enforcement Division Criminal Justice Information System (CJIS)
South Carolina Law Enforcement Division Criminal Justice Information System (CJIS) USER AGREEMENT AND SYSTEM RESPONSIBILITIES Introduction The South Carolina Criminal Justice Information and Communications
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationNATIONAL STRATEGY FOR INFORMATION SHARING AND SAFEGUARDING
NATIONAL STRATEGY FOR INFORMATION SHARING AND SAFEGUARDING DECEMBER 2012 THE WHITE HOUSE WASHINGTON As President, I have no greater responsibility than ensuring the safety and security of the United States
More information