The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova
|
|
|
- Wendy Lee
- 10 years ago
- Views:
Transcription
1 The IJIS Institute Emerging Technologies Committee Presents: Matthew D Alessandro Scott Edson Iveta Topalova Realize the Power of Information
2 Non-profit consortium representing leading companies that supply IT solutions and services to the justice, public safety and homeland security sectors Funded by industry contributions and grants from federal agencies Provide training, technology assistance and program management services to state, local, tribal and federal organizations to help them realize the power of information
3 The IJIS Institute unites the private and public sectors to improve critical information sharing for those who provide public safety and administer justice in our communities.
4 is at the heart of everything we can do to reduce crime, prevent terrorism, and improve the quality of public safety in America
5 is the most prolific enabler of secure information sharing across all levels of organizational, jurisdictional and geographic boundaries
6 promote economical and accelerated deployment of technology standards
7 The biggest driver for interoperability in mission fulfillment being able to responsibly share information with adequate safeguards. Kshemendra Paul, PM-ISE
8 Big Data in Simple Terms How Big Data Changes Law Enforcement Taking Advantage of Big Data Enabling Big Data through the CJIS Cloud Policy, Procedures and Governance Execution Q&A
9
10 Big data is a collection of data from traditional and digital sources inside and outside your organization that represents a source for ongoing proactive, reactive and forensic analysis.
11 Data sets whose size and characteristics are beyond the ability of commonly used software tools to capture, store, manage, process and analyze effectively using traditional approaches
12 All the printed material in the world = less than 20 petabytes
13 A full 90% of all the data in the world has been generated over the last two years.
14 Volume -- amount of data at rest Variety data in many different forms Velocity -- speed of data in motion Variability -- inconsistencies over time Veracity inconsistency in quality leading to uncertainty Volume Veracity Variety Variability Velocity COMPLEXITY
15 Volume Velocity Information Overload Variety Variability
16 Acquire Assess Advanced Analytics Act Account
17
18
19
20 Real Time Crime Centers/Intel Centers Intelligence Led Policing Predictive Policing Information Sharing Safe Smart City Initiatives Video Management and Analytics The Internet of Things Body Worn Cameras Mobility
21 Crime has no borders You need to know what is happening even across the line Tools to avoid information overload
22
23
24
25
26
27 IT professionals estimate that they have less than half of the storage, computing, and personnel resources necessary to leverage big data for efficiency gains, better decision making.* Source: The Big Data Gap study sponsored by NetApp and performed by MeriTalk
28 Cloud computing is more than just the latest in a series of attempts to pare down government spending it s a gateway to unprecedented innovation in a sector known more for bureaucratic inertia. Rick Holgate, president of the American Council for Technology (ACT) The experience over the past five years has proven some tangible benefits: - Hybrid cloud enables balance between cost and risk reduction - Cloud enables agility and scalability - Value added services such as Machine Learning and Media Services are key to innovation Source: Forbes 'Government as a Platform': How Cloud Computing Is Progressing Inside The Beltway
29 A Community Cloud based on NIST Definition: The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). Compliance with the CJIS security policy and other national standards.
30 Support for national standards for protecting criminal justice information Data center location and resilience Collaboration with state CSO s in the area of compliance with national standards? Fully isolated network and hardware instance Employees in data center subject to the FBI background check Auditability to demonstrate full compliance with the CJIS Security Policy
31 Common Big Data Definition for Law Enforcement Adoption of a Common Governance Model Clear and Compelling Business Case Development of Common Standards Address Privacy and Security Concerns Identification of Implementation Models
32 New and emerging technologies increasingly play a crucial role in the daily work of police, equipping officers with enforcement and investigative tools that have the potential of making them safer, better informed, and more effective and efficient. Developing and enforcing comprehensive agency policies regarding deployment and use is a critical step in realizing the value that technologies promise, and is essential in assuring the public that their privacy and civil liberties are recognized and protected.
33
34 SEARCH, in partnership with BJA, developed the first Privacy Impact Assessment (PIA) tool to assist agencies when developing or reviewing their privacy and civil liberties policies.
35 License Plate Readers CAD 911 calls, dispatch Vehicle Locators Big Data Officers Need Real Time Officer Vitals hearth beat, blood pressure, etc. Offenders on Parole (ankle bracelets) Cameras, video surveillance Shots fired Social media, citizens as sensors
36 As the world continues to become more and more social competitive advantage will come to those who understand what s happening better than their peers and can directly connect it to their business outcomes and other useful pursuits. * *Source: How social media and big data will unleash what we know by Dion Hinchcliffe
37 Terrorism has gone viral* US officials, lawmakers warn of growing jihad-inspired attacks facilitated through the use of social media. * *Source: *Source: Terrorism has gone viral, FoxNews, Published May 10 th 2015
38 Now there are tools which enable effective use of big data You have to get there because the public will demand it
39 Define your agency s business case Identify and prioritize data Based on Return on Investment Create a roadmap with knowledge gained from data as a foundation
40 Realize the Power of Information
Two Recent LE Use Cases
Two Recent LE Use Cases Case Study I Have A Bomb On This Plane (Miami Airport) In January 2012, an airline passenger tweeted she had a bomb on a Jet Blue commercial aircraft at the Miami International
Setting the Standard for Safe City Projects in the United States
Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,
Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers
Fusion Center Technology Resources Road Map: Elements of an Enterprise for State and Major Urban Area Fusion Centers General Overview The function of a fusion center is to provide a collection, analysis,
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
Privacy in the Cloud A Microsoft Perspective
A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft
InforCloudSuite. Public Sector. Overview INFOR CLOUDSUITE PUBLIC SECTOR 1
InforCloudSuite Public Sector Overview INFOR CLOUDSUITE PUBLIC SECTOR 1 What if... You could improve service to your community in spite of having to do more with less? You could implement flexible solutions
Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.
Security solutions To support your business objectives Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives. For an On Demand Business, security
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement
INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE Guiding Principles on Cloud Computing in Law Enforcement Cloud computing technologies offer substantial potential benefits to law enforcement and government
The CHICAGO STORY. Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments
The CHICAGO STORY Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments 3rd Largest U.S. City 2.9 million residents 228 square miles CPD 2 nd largest
Boosting Business Agility through Software-defined Networking
Executive Summary: Boosting Business Agility through Software-defined Networking Completing the last mile of virtualization Introduction Businesses have gained significant value from virtualizing server
Rapid Visualization with Big Data Analytics. Ravi Chalaka VP, Solution and Social Innovation Marketing
Rapid Visualization with Big Data Analytics Ravi Chalaka VP, Solution and Social Innovation Marketing Imagine the Future Innovative cities that dramatically enhance the wellbeing of its citizens Safer
Addressing government challenges with big data analytics
IBM Software White Paper Government Addressing government challenges with big data analytics 2 Addressing government challenges with big data analytics Contents 2 Introduction 4 How big data analytics
GIS for Real-Time Crime Centers. An Esri White Paper June 2013
An Esri White Paper June 2013 Copyright 2013 Esri All rights reserved. Printed in the United States of America. The information contained in this document is the exclusive property of Esri. This work is
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
Government Security Solutions YOUR PARTNER OF CHOICE. Protecting People, Places And Perimeters
Government Security Solutions YOUR PARTNER OF CHOICE Protecting People, Places And Perimeters From government buildings to military facilities to legislative offices and more, everything is a target. And
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Community Policing. Defined
Community Policing Defined The Primary Elements of Community Policing Nonprof its / Service Providers Using the Crime Triangle Community policing is a philosophy that promotes organizational strategies
Regional Police Collaboration and Community Engagement Using GIS and Crime Analysis Dashboards
Regional Police Collaboration and Community Engagement Using GIS and Crime Analysis Dashboards Jason McKinley City of Ann Arbor Matthew Brown San Diego Harbor Police CLEMIS PROJECT CASE STUDY: A dashboard
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)
Statement of Mike Sena President, National Fusion Center Association Director, Northern California Regional Intelligence Center (NCRIC) Joint Hearing of the Subcommittee on Emergency Preparedness, Response,
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment
Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment This template is provided to support the police service and other law enforcement agencies (LEA)
The structure and organization of the Fusion Center takes its direction from four key documents, they are:
The structure and organization of the Fusion Center takes its direction from four key documents, they are: Northern Operational Office MISSION We incorporate information and utilize relationships formed
ANNEX ENLETS. Work programme 2014-2020. European Network of Law Enforcement Technology Services 2013-11-10. 17365/13 EB/hm 2 ANNEX DG D 2C LIMITE EN
Delegations will find attached the work programme of the European Network of Law Enforcement Technology Services (ENLETS) 2014-2020. COSI is invited to endorse this work programme. 17365/13 EB/hm DG D
THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE
THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE BIG DATA ANALYTICS SCOPING REPORT July 20, 2015 DRAFT THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE BIG
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive
Contact Center Security: Moving to the Cloud
white paper Contact Center Security: Moving to the Cloud Table of Contents Executive Overview 2 A Critical Attribute of a Cloud Provider: Proven Security 2 How Do Well-established Companies Chose a Cloud
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Hybrid Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Hybrid Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction The economic benefits offered by public clouds are attractive enough for many
Department of Homeland Security Information Sharing Strategy
Securing Homeland the Homeland Through Through Information Information Sharing Sharing and Collaboration and Collaboration Department of Homeland Security April 18, 2008 for the Department of Introduction
Business Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
Contact Center Security: Moving to the True Cloud
White Paper Contact Center Security: Moving to the True Cloud Today, Cloud is one of the most talked about trends in the IT industry. It s a paradigm many believe will have a widespread business impact.
Test Data Management in the New Era of Computing
Test Data Management in the New Era of Computing Vinod Khader IBM InfoSphere Optim Development Agenda Changing Business Environment and Data Management Challenges What is Test Data Management Best Practices
NFV Live! 15. Using closed-loop automation and data analytics to manage virtualized and hybrid networks
NFV Live! MONDAY, MAY 9, 2016 1. CASE STUDY: Real world deployment - the transformation to a virtualized network 2. CROSS INDUSTRY CASE STUDY: Virtualizing the data center to enable the efficient delivery
Creating a Multi-Agency Shared Software System: Best Practices. A Spillman Technologies White Paper
Creating a Multi-Agency Shared Software System: Best Practices A Spillman Technologies White Paper Multi-Agency Data Sharing Table of Contents: Introduction...page 1 What is a Multi-Agency Shared Software
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
Accelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Deploying Big Data to the Cloud: Roadmap for Success
Deploying Big Data to the Cloud: Roadmap for Success James Kobielus Chair, CSCC Big Data in the Cloud Working Group IBM Big Data Evangelist. IBM Data Magazine, Editor-in- Chief. IBM Senior Program Director,
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
Cisco Cloud Enablement Services for Adopting Clouds
Cisco Cloud for Adopting Clouds Cisco Cloud for Adopting Clouds help you understand which applications you need to migrate; build business justifications for migrating your applications to a public cloud
1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.
Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the
DEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border
Common Competencies for State, Local, and Tribal Intelligence Analysts
DEPARTMENT OF JUSTICE United States Department of Justice Common Competencies for State, Local, and Tribal Intelligence Analysts June 2010 A Companion Document to the Minimum Criminal Intelligence Training
7 things to ask when upgrading your ERP solution
Industrial Manufacturing 7 things to ask when upgrading your ERP solution The capabilities gap between older versions of ERP designs and current designs can create a problem that many organizations are
Hitachi Visualization. Twin Cities Public Safety Presentation
Hitachi Visualization Twin Cities Public Safety Presentation Safer, Smarter, More Efficient Communities INTEGRATED REPORTING AND ANALYTICS: ACTIONABLE INSIGHT ENERGY UTILITY VEHICLE TRANSIT PUBLIC SAFETY
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
Training Courses Catalog 2015
Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction
ACTIVITY & LOCATION BASED ANALYTICS APPLICATIONS
ACTIVITY & LOCATION BASED ANALYTICS APPLICATIONS SEAMLESS, REAL TIME MERGING OF GIS AND ERP SYSTEMS ALLOWING THE VISUALIZATION OF RELATIONSHIPS, CONNECTIONS AND PATTERNS IN THE DATA FOR INTELLIGENT, INFORMED
Self assessment tool. Using this tool
Self assessment tool How well does your organisation comply with the 12 guiding principles of the surveillance camera code of practice? Complete this easy to use self assessment tool to find out if you
TENNESSEE DEPARTMENT OF SAFETY AND HOMELAND SECURITY TENNESSEE OFFICE OF HOMELAND SECURITY
Page0 Page1 Available as of January 1, 2014 Law Enforcement / Public Safety Courses Introduction to Terrorism Terrorism can range from complex plots to small scale attacks and can take many forms. Often,
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
National Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair [email protected] 1 The National Institute of Standards
Cyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
New Technology Capabilities
New Technology Capabilities Software/Applications 1. Biometric ID capability 2. Standardized secure, connectivity, and storage of data (bio, roles, etc) 3. Rules- based expert engine a. Automated dispatch
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group [email protected] Twitter @PeterDReynolds The Hardware Layer
The Need to Share: The U.S. Intelligence Community and Law Enforcement
The Need to Share: The U.S. Intelligence Community and Law Enforcement A White Paper prepared by the AFCEA Intelligence Committee April 2007 Serving Intelligence Professionals and their Community The Need
Big Data: Overview and Roadmap. 2015 eglobaltech. All rights reserved.
Big Data: Overview and Roadmap 2015 eglobaltech. All rights reserved. What is Big Data? Large volumes of complex and variable data that require advanced techniques and technologies to enable capture, storage,
Fusion Center Guidelines
Fusion Center Guidelines Developing and Sharing Information and Intelligence in a New Era Guidelines for Establishing and Operating Fusion Centers at the Local, State, and Federal Levels Law Enforcement
Secure Cloud Computing Concepts Supporting Big Data in Healthcare. Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC
Secure Cloud Computing Concepts Supporting Big Data in Healthcare Ryan D. Pehrson Director, Solutions & Architecture Integrated Data Storage, LLC Learning Objectives After this session, the learner should
Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system.
Inform RMS The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system. Covering the entire life span of records development from initial generation to
Alien Criminal Response Information Management System (ACRIMe)
for the Alien Criminal Response Information Management System (ACRIMe) DHS/ICE/PIA 020(d) January 24, 2013 Contact Point Gary Mead Enforcement and Removal Operations U.S. Immigration and Customs Enforcement
VMware vcloud Powered Services
SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to
Capital Area Council of Governments FY 2015 Homeland Security Program Regional Grant Process
Capital Area Council of Governments FY 2015 Homeland Security Program Regional Grant Process General Information Texas uses a regional approach to the State Homeland Security Grant Program (HSGP), providing
CURRICULUM REVISION: MASTER OF PUBLIC ADMINISTRATION: PUBLIC POLICY AND ADMINISTRATION CURRICULUM REVISIONS. REQUIRED COURSES Subtotal: 21
CURRICULUM REVISIONS CURRICULUM REVISION: MASTER OF PUBLIC ADMINISTRATION: PUBLIC POLICY AND ADMINISTRATION Program Director: Professor Marilyn Rubin The mission of the Master of Public Administration
