January 2013. SEARCH Membership Meeting



Similar documents
Best Practice Procedures for The Exchange of Latent Identification Services

Classification: CJIS Program Manager (UCR/Auditing) Title Code: V00681 Pay Range: 34

System availability will be limited during this initiative. Accordingly, the CJIS Division will provide advanced notice of sporadic system

Extended Feature Set Profile Specification

PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS

CJIS VENDOR AGREEMENT CJIS COMPUTER SYSTEMS COLORADO BUREAU OF INVESTIGATION

Alan Ferretti CJIS Information Security Officer

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)

Department of Veterans Affairs VHA DIRECTIVE Veterans Health Administration Washington, DC February 8, 2011

Arkansas. California. Connecticut. Delaware

Rapid DNA Analysis in the Police Booking Suite: FBI Initiative for Reference Sample Point-of-Collection Analysis

Mission Statement. Provide comprehensive vendor and project management solutions tailored specifically to our clients needs.

Western Service Center

CJIS Information Technology Security Audit (ITSA) 2015 Program Update

YEAR TWO. Total Credits 3 Total Credits 6 Total Credits 3 Total Credits 6 Total Credits 6

CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.

Introduction DEFINITIONS

Moving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them

MORPHO CRIMINAL JUSTICE SUITE

1 WHAT IS IPSFRP? 2 WHO CAN USE IPSFRP? 3 HOW DO I USE IPSFRP?

CJIS Division Update

Technical Assistance Guide No PDMP Data Management Solutions

Submitted to: Service Definition Document for Database Management for IT Infrastructure Management

Adapting BJS s web-based recidivism analysis tool for state-level queries

Overview of Current Criminal Justice Information Systems

Criminal Justice Information Services (CJIS) Security Policy

Criminal Justice Information Services (CJIS) Security Policy

Hosting JDE EnterpriseOne in the Cloud Hear how one company went to the cloud

Security in Fax: Minimizing Breaches and Compliance Risks

REQUEST FOR PROPOSAL INFORMATION TECHNOLOGY SUPPORT SERVICES

SIP-ing? Pipeline Articles

Identity Management: Going Beyond Biometrics! Presented by: JOSEPH J. ATICK, Ph.D. PRESIDENT AND CEO

FUNCTIONAL AREA 12. Network Administration (NET)

ACQUISITION OF COMPUTER HARDWARE, SOFTWARE AND SERVICES

The Dos and Don'ts of Choosing a Telephone System Upgrade: Including the DMS Options

Next Generation Identification Program (NGI) Rap Back Service

Criminal Justice Information Services (CJIS) Security Policy

Senate Bill 9 Background Checks for Education A Reference Guide January 1, 2008

Advanced IT Pro Course for Office SharePoint Server 2007 and SharePoint Services 3.0

Request of Expressions of Interest For Information Technology Consulting Firm

South Carolina Law Enforcement Division Criminal Justice Information System (CJIS)

Texas State Library and Archives Commission. Information Technology Detail. August 26, 2010

Department-wide Systems and Capital Investment Program

Vendor Questions and Responses

Introduction. Our Services

Dublin City University

Criminal Justice Information Services (CJIS) Security Policy

Validating Enterprise Systems: A Practical Guide

Oracle Data Integrator and Oracle Warehouse Builder Statement of Direction

RFP Call Center Services Final Response to Questions 9/4/15. RFP Text Question Answer

Technology Consulting. Infrastructure Consulting: Next-Generation Data Center

City of Fayetteville, Arkansas Page 1 of 1

The following questions and responses have been amended from those previously answered on Clarification No. 1, dated August 19, 2014:

United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)

SUMMARY OF LAW AND POLICY PROGRAM ADVISORY COMMITTEE MEETING. Saturday, January 24, 2004 Las Vegas, Nevada

ILLINOIS REGISTER DEPARTMENT OF STATE POLICE NOTICE OF ADOPTED RULES

Product Testing Programs

Managing Vendors on Procurement Management Portal

REQUEST FOR INFORMATION # AMENDMENT # 1 FOR LAW ENFORCEMNT RECORDS MANAGEMENT SYSTEM

Software Systems Consultants Inc. IT Solutions & Staffing Services

Summary Reporting System. National Incident-Based Reporting System

Transportation Solutions Built on Oracle Transportation Management. Enterprise Solutions

Defense Security Service

Department of Homeland Security

And Take a Step on the IG Career Path

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Helping Businesses to Leverage the Power of Managed Services

PRIME IDENTITY MANAGEMENT CORE

Needs & Applications of Latents at FBI/CJIS

An Automated System for Transforming National Criminal History Records into Statistical Databases

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Planning, Deploying, and Managing an Enterprise Project Management Solution

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

William F. Leo Forensic Identification Consultant Credentials

Information Security Program CHARTER

ADDENDUM 5 TO APPENDIX 6 TO SCHEDULE 3.3

Alien Criminal Response Information Management System (ACRIMe) April 22, 2010

Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332A; 5 Days, Instructor-led

The Leading Provider of Identity Solutions and Services in the U.S.

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Planning, Implementing and Managing a Microsoft SharePoint 2003 Infrastructure

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009

Fusion Center Technology Resources Road Map: Elements of an Enterprise Architecture for State and Major Urban Area Fusion Centers

NC CJIN Governing Board. 13 October, George A. White

U.S. Department of Housing and Urban Development Data Center Consolidation Plan

SOUTHERN CALIFORNIA GAS COMPANY ADVANCED METERING INFRASTRUCTURE CHAPTER IV

KMS Implementation Roadmap

CONSULTING SERVICES Financial Systems Implementation Support

VOLUNTEER & EMPLOYEE CRIMINAL HISTORY SERVICE (VECHS) USER AGREEMENT FOR CRIMINAL HISTORY RECORD INFORMATION

Tackling ERP Modernization: A New Approach for State and Local Government

We want to clarify for all vendors our definition of SaaS and Managed Services.

CITY OF FRISCO PURCHASING DIVISION

Clarity Infrastructure Management helps network operators to plan and document the change to their networks

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE. Guiding Principles on Cloud Computing in Law Enforcement

Domain 1 The Process of Auditing Information Systems

ABCs of the FBI Training Academy What it costs to train a Special Agent. March 16, 2011

Transcription:

January 2013 SEARCH Membership Meeting

Best Practices = Survival Skills: Figure out what CJIS is doing and copy it.ansi NIST ITL 2011, EBTS 10.0 If you are confused, call Charlie Schaeffer (FDLE) and Mike Lesko (Texas DPS) Can you get where you want to go with your legacy vendor? The participants who start the project aren t necessarily the ones who complete the project preserve the record! Make effective use of outsourcing for project Mgt and Technical Specs Don t Pave COWPATHS! 2

Perfect is the Enemy of Done! Insisting on perfection often results in no improvement at all Voltaire? 3

4

Feature Present 2012 Capability Projected 2020 Capability Daily Ten print Submissions 7,000 11,000 Daily Latent Submissions 500 3,000 Ten print Database Size 7,000,000 26,000,000 Multi Event Database-Up to 4 1 st QTR Exists Events 2014 Palm Database Size 500,000 4,750,000 WIN Connected Ten print 29,000,000 40,000,000 Database Size 5

WIN will have a Disaster Recovery Capability DR System is being built in Rancho Cordova, CA System will be deployed to NEC Irving Texas 6

WIN Stature within the CJIS Community: WIN is a Private Entity providing services to criminal justice agencies for the Administration of Criminal Justice: Subject to 28 CFR as a private entity. Like Nlets Maintains CJIS Security Addendums with WIN Members Maintains CJIS Security Addendum with NEC Maintains WIN Security Policy which adopts CJIS Security Policy WIN has an assigned ORI 7

WIN Business Model: 1. 501 (c)(3) Non Profit formed in 1989 (Nevada Corp) 2. Governed by a Board of Directors from the 9 Member States 3. WIN-Operations Group ID Bureau Managers 4. WIN Staff in Sacramento manage the day to day business 5. WIN Provides an AFIS Service Bureau utilized by 8 Western State Repositories. 6. WIN Provides a Proprietary (Non-NIST) search network to the California DOJ, California Locals and Las Vegas Metro. 7. WIN is programmed to submit and receive NIST Ten Print and Latent INBOUND OUTBOUND Searches. 8

WIN Management Model: Minimize Staff Optimize Outsourcing of Required Services WIN recently completed a High Profile Bid NEC continues as ABIS service provider WIN Contracts with Nlets for Network Management WIN Contracts with AWARE for EBTS related Support WIN Contracts with a CPA for Accounting Services 9

WIN Management Model (Contd): WIN Presently has 3 Staff: Ken Bischoff CEO Dusty Clark Training and QA Manager Gary Goad Member Services Manager Contract with Technical and other Expertise as required: HAI IAFIS, NGI, RCMP, IRAQ Acquisitions MTG Management Consultants Planning, Procurement Downey Brand Legal Support 10

How WIN Got Started: Leadership from Western Members of the Former NCIC APB Leadership from Western States Information Network (RISS) Resolution from the Western Legislative Conference Resolution from the Conference of Western Attorneys General Legal Assistance from State Attorneys Procurement Assistance from State Entities RFP/Specifications Assistance from California DOJ 11 Volunteerism from the original state members

WIN Governing Documents: Articles of Incorporation Corporation Bylaws User Agreements Central Site Member Interface State Member Local Reciprocal Search Agreement Service Provider Contracts 12

WIN System Documentation Electronic Biometric Transmission Specification NIST Device Configuration Guide 13 Technical System Specifications System Design Interface NIST Submission, NGI, CCH Continuity of Operations Plan Training Plan, User Guides In Plant Security Plan Implementation Statement of Work Operational Statement of Work

Current Activities: 1.Support legacy platform 14 2.Build and Deploy New Platform: Adopt new NGI Functionality Migrate to multi-event, Fusion Matching Deploy Disaster Recovery Site Work with membership to participate in Factory, Site and User acceptance. Update EBTS to comport with updated environment. Upgrade Network, CJIS WAN Backup, Disaster Recovery/Failover Links

Nlets Support Role: 1.Network Management 2.Device acquisition configuration 3.CJIS Security Compliance 4.Network Documentation 5.Member Troubleshooting Support 15

AWARE Support Role: On call EBTS technical support Maintain WIN EBTS Verification Software Maintain WIN EBTS Reference Guides Capable of providing State Specific Support Local EBTS field requirements High volume integrated Scanners Local Workflow Management (BIOsp) 16

17

What were we thinking? A decade prior to IAFIS, No National Standards No Interfaces Submission, CCH, IAFIS, 9.6 Baud Implement Nations first Multi-State AFIS System Search CalDOJ, California Locals, Washington, Alaska. WIN Bid for initial system, NEC Awarded Bid. 18

What are we thinking? WIN continues to be relevant. Perhaps even more so today: INTEROPERABILITY - See National Academy of Sciences (NAS) and Latent Print Interoperability reports: Strengthening Forensic Science in the United States: A Path Forward, Latent Print Interoperability: State and Local Perspectives by NOBLIS WIN s Next Generation ABIS adopts the new latent extended feature set interoperability standard. 19

State Repositories Have Common Needs that can Be leveraged: FBI Next Generation Identification Criminal History Interface Civil and Criminal event capture Mobile ID Security CJIS Security Compliance Support for in state local agencies Support for State Criminal Justice System 20

National Standards apply that can be leveraged: All states must comply with NIST/EBTS to submit to NGI. We are already using a shared standard. All States use FBI EBTS Transactions. Record Types are the same. WIN provides a standards based NIST Submission Interface WIN Provides a Standards based CCH Interface WIN Provides a Standards based NGI Interface WIN Provides flexibility within these interfaces 8 states are successfully using these same standards and interfaces Build Once..Deploy Many 21

Future Growth: WIN TEXAS DPS Interface WIN Architecture Can accommodate new members Concept of Scope 22

Questions? 23