U.S. Department of Justice Global Justice Information Sharing Initiative Annual Report 2011

Size: px
Start display at page:

Download "U.S. Department of Justice Global Justice Information Sharing Initiative Annual Report 2011"

Transcription

1 U.S. Department of Justice Global Justice Information Sharing Initiative Annual Report 2011 Introduction Never before has America s need for justice information sharing been more compelling. The absence of this capability, however, has plagued practitioners for decades. While broad-scale exchange has yet to be achieved, claims that the problem has gone unaddressed are unwarranted. The U.S. Department of Justice s (DOJ) Global Justice Information Sharing Initiative (Global) 1 Advisory Committee (hereafter, GAC or Committee) exists to make recommendations and support the chief law enforcement officer the U.S. Attorney General. With the support and guidance of the Bureau of Justice Assistance (BJA) and DOJ, the GAC has concentrated its diverse expertise on challenges and opportunities for justice and public safety information sharing. Since 1998, members of this Federal Advisory Committee representing justice and public safety communities at all levels of government have actively advocated information sharing while safeguarding citizens constitutional rights. Global is aimed at facilitating the appropriate availability of information and is truly a national effort. Background Global: Leading the way getting the right information to the right people, in the right place, at the right time. Vision Statement of the Global Advisory Committee Mission and Guiding Principles Enhanced information sharing is essential for effective justice and public safety business operations on many levels: It facilitates the best possible decision making by arming executives with complete and current facts, and it saves program managers and technologists the increasingly shrinking resources of time and effort, allowing practitioners to do what has become a routine demand doing more with less. In the justice and public safety arenas, comprehensive and timely access to data and the ability to analyze and share that information is often the linchpin between prevention and immediate response or devastation. Consider post-hurricane Katrina, when the response was significantly hampered by a lack of information on the ground, or, perhaps most vividly, the communication failures of 9/11, when firefighters and police responding to the same crisis, in the same location, were unable to receive and share critical information as tragedy unfolded around them. Add the increasing, evolving complexity of justice-related scenarios from responding to pandemics to collaborating with new partners such as the transportation and hospitality industries in the fight against terrorism and the communication proposition can seem overwhelming. While these high-profile events underscore the necessity of justice-related information sharing, the effective commission of routine justice business processes, such as court adjudication and sentencing or carefully planned prisoner reentry into our neighborhoods and communities, is Page 1 of 17

2 grounded in the same imperative: getting the right information to the right person in the right place at the right time. As the Federal Advisory Committee to America s chief law enforcement officer, the U.S. Attorney General, on standards-based, justice-related information sharing, the U.S. Department of Justice s (DOJ s) Global Justice Information Sharing Initiative (Global) through its Global Advisory Committee (GAC), with support and guidance from the Bureau of Justice Assistance (BJA) has responded to this charge with a range of valuable solutions at no cost to colleagues in the field. Chartered in 1998 by former U.S. Attorney General Janet Reno, the Global Initiative was carefully structured to function as a unique collaboration of justice leaders. Today, Global is respected as the preeminent voice of local, state, and tribal governments helping shape the nation s information sharing solutions. Through a structured and in-depth collaborative process, which is a unique Global hallmark, the members of the GAC have developed and supported numerous groundbreaking advances that have proven invaluable in overcoming information sharing obstacles. The guiding principles of the GAC are to: Support the goals of the U.S. Attorney General and DOJ by promoting an inclusive environment, bringing together representatives from the entire justice, public safety, and first responder communities to address and make recommendations to overcome the barriers to justice information sharing across agencies, disciplines, and levels of government. Facilitate information sharing among local, state, tribal, and federal law enforcement agencies large or small through the exploration and promulgation of the most promising methods for developing and sharing critical intelligence data. Support the development and implementation of standards that facilitate seamless exchange of information among justice, public safety, and first responder communities. Provide information that supports sound business decisions for the planning, design, and procurement of cost-effective, interoperable information systems. Identify concepts that leverage existing infrastructure, capabilities, and functionality. Support constitutional values and individual rights by ensuring the accuracy and security of justice information and the implementation of appropriate privacy safeguards. GAC recommends the adoption of privacy and information quality policies that promote the responsible collection, handling, management, review, and sharing of personally identifiable information. Acknowledge that while there is a strong national consensus that improved justice-related information sharing is critically important, there is a commensurate desire to protect individuals privacy. The GAC operates in accordance with Federal Advisory Committee Act (FACA) provisions and convenes twice a year in Washington, DC. In 2011, the GAC met on April 20 and October 13. Meetings are announced in the Federal Register, and members of the public are welcome as observers. GAC Structure: Membership, Leadership, and Working Groups GAC members represent key organizations from local, state, tribal, federal, and international justice and public safety and include agency executives and policymakers, automation planners and managers, information practitioners and, most important, end users. This last group distinguishes GAC as a committee: its members remain actively dedicated to information Page 2 of 17

3 sharing precisely because they continue to be producers, consumers, and administrators of crucial justice-related data. Membership Committee membership reflects the fundamental tenet that the entire justice-interested community must be involved in information exchange. Member agencies are as follows: Administrative Office of the U.S. Courts American Association of Motor Vehicle Administrators American Correctional Association American Probation and Parole Association Association of State Correctional Administrators Conference of State Court Administrators Criminal Intelligence Coordinating Council Criminal Justice Information Services Advisory Policy Board Executive Office for United States Attorneys Federal Bureau of Investigation Criminal Justice Information Services Division International Association of Chiefs of Police International Association of Chiefs of Police Division of State and Provincial Police International Association of Chiefs of Police Indian Country Law Enforcement Section INTERPOL Washington Major Cities Chiefs Association National Association for Court Management National Association of Attorneys General National Association of Counties National Association of State Chief Information Officers National Center for State Courts National Conference of State Legislatures National Council of Juvenile and Family Court Judges National Criminal Justice Association National District Attorneys Association National Governors Association National Legal Aid & Defender Association National Sheriffs Association Nlets The International Justice and Public Safety Information Sharing Network SEARCH, The National Consortium for Justice Information and Statistics U.S. Department of Homeland Security U.S. Department of Justice Leadership The GAC chair and vice chair are elected biennially (most recently, fall 2010) by fellow committee members. The current GAC Chair is Mr. Robert Boehmer, Director, Institute for Public Safety Partnerships, University of Illinois at Chicago, representing the National Criminal Justice Association (NCJA). The current GAC Vice Chair is Mr. Carl Wicklund, Executive Director, American Probation and Parole Association (APPA), representing APPA on the Committee. Elections for the succeeding GAC leadership term will occur in fall Page 3 of 17

4 The GAC Executive Steering Committee (GESC) consists of the GAC chair and vice chair, working group chairs, and four at-large GAC representatives. The at-large representatives are nominated and elected by the GESC. The GESC has the responsibility to: Provide advice to the Designated Federal Official (DFO) regarding areas of priority and recommended research and prepare advisory recommendations for the approval of the GAC. Upon approval of advisory recommendations, the GESC forwards them to the Assistant Attorney General and the U.S. Attorney General (or the designated appointee). Schedule meetings and develop GAC meeting agendas with the approval of the GAC chair and the DFO. Solicit suggestions for additional technical, professional, and administrative assistance to effectively and adequately address areas of need to support DOJ activities. The GESC meets immediately before biannual GAC meetings to prepare for the larger gatherings, consult with federal officials, and conduct executive business in support of the Initiative. In 2011, these pre-gac meeting events were held on April 19 and October 12. GESC members convene two additional times a year (winter and summer) specifically to strategize for ongoing GAC activities and future courses of action. In recognition of Global s fundamental tenet of collaboration and support of complementary efforts at all levels of government, the GESC purposefully coordinates these strategic planning meetings with partner events (for example, on August 3 in conjunction with the NCJA s Annual Conference). This provides Global leaders with the opportunity to visibly exhibit the ideals of justice community esprit de corps through on-site participation, networking, and promulgation of Global resources, as well as to leverage time, travel, and financial resources. The GESC also conducts business via conference calls and , as necessary. Working Groups GAC working groups and councils comprise committee members and other subject-matter experts, expanding GAC s knowledge and experience. These groups are formed around timely issues affecting justice information sharing and meet as often as necessary. During 2011, the following working groups engaged in the following targeted areas. Global Infrastructure/Standards Working Group The Global Infrastructure/Standards Working Group (GISWG) was formed to facilitate broadscale data exchange by developing and adopting an architecture and standards that enable transparent integration of disparate systems. This working group recommends a framework that assists government entities in establishing an operational environment, enabling the sharing of justice, public safety, and first responder information within the guiding principles of the GAC. GISWG identifies strategies and tactics that will implement that framework, which will be designed to identify those critical components programmatic and technical necessary to develop and maintain a sound justice information sharing architecture. Global Intelligence Working Group and Criminal Intelligence Coordinating Council The Global Intelligence Working Group (GIWG) and the Criminal Intelligence Coordinating Council (CICC) are charged with advising and providing recommendations to the U.S. Attorney General on issues relating to advancing the use of technology, standards, and collaboration between agencies/organizations in the area of criminal intelligence. The GIWG and CICC serve Page 4 of 17

5 as advocates for local law enforcement in their efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation. This working group provides guidance and advice in connection with the implementation and refinement of the GIWG/CICC-facilitated National Criminal Intelligence Sharing Plan (NCISP or The Plan ) and Fusion Center Guidelines. (Global groups supported the development of these hallmark resources in partnership with a number of intelligence partners representing different levels of government.) This goal is supported by the Criminal Intelligence Coordinating Council (CICC), inaugurated in June 2004, whose members advocate for local law enforcement in its efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation. The GIWG and CICC work to ensure that every chief, sheriff, and law enforcement and homeland security executive understands the role his or her agency plays in the development and sharing of information and intelligence. The Global Initiative, the intelligence community, and the larger justice landscape in which the GIWG/CICC serves and operates are dynamic entities and environment. As such, this mission will likely evolve as efforts continue toward implementation of the Information Sharing Environment Implementation Plan and the Guideline Reports, per the Intelligence Reform and Terrorism Prevention Act of 2004, as well as the National Strategy for Information Sharing. State, local, and tribal law enforcement agencies are expected to be affected by the impending changes and will need guidance and assistance. Global Outreach Working Group The Global Outreach Working Group (GOWG) dedicates the entire focus of its endeavors to supporting Global s mission to facilitate broad-scale sharing of justice and public safety information by promoting standards-based electronic information exchange, providing the justice community with timely, accurate, complete, and accessible information in a secure and trusted environment. Awareness is implicitly a Global strategic goal in support of this mission, because the best GAC resources are only as good as their utility to and use by the justiceinterested community. Awareness is the first step in adoption of Global recommendations and, by extension, support for and promulgation of the Global Initiative. GOWG efforts are focused in two distinct (and sometimes overlapping) directions promoting the good works of the Initiative to the larger justice community ( outreach ), and also ensuring GAC participants are fully informed not only about Global activities, but also about their roles and responsibilities as members of the Committee ( inreach ). GOWG members concentrate on delivering outreach and inreach assistance in an institutionalized and consistent manner, elevating previously ad-hoc Global communications activities to a systematic process. Global Privacy and Information Quality Working Group The Global Privacy and Information Quality Working Group (GPIQWG) was formed by BJA because of the growing need to address information privacy as affected by advancing technological capabilities. Indeed, privacy may become one of the most important technology issues of the twenty-first century. This working group makes recommendations to the U.S. Attorney General on issues regarding the adoption of privacy and information quality policies by justice system participants. These policies promote the responsible collection, handling, management, review, and sharing of (personal) information about individuals. The GPIQWG: (1) assists government in ensuring that personal information will not be inappropriately disseminated or misused; (2) ensures that Page 5 of 17

6 there are safeguards against the collection and use of inaccurate information particularly when the information is disseminated in open environments such as Internet-based systems; and (3) improves the reliability of criminal records in an integrated electronic system. Global Security Working Group The Global Security Working Group (GSWG) was formed in recognition of the fact that the security of the justice information exchange enterprise is only as strong as its weakest link. Of particular importance is the enhancing of data security across trusted justice information systems and networks, developing best practices based on industry standards, and creating an awareness of the criticality of security for the exchange of data. The working group s focus is based on justice practitioners needs, industry direction, and key collaborative initiatives from the other Global working groups. GSWG members acknowledge the importance of determining effective security guidelines for legacy systems, as well as for the new and enhanced systems to which they are joined. This working group enables the trusted sharing of justice information by recommending best practices for security guidelines, technologies, and procedures. This goal encompasses exploration and recommendations regarding resources on wireless security, security architecture, and Web services security. Also, standards and architectures need to be identified that allow practitioners to acquire and migrate to the technologies and policies that provide secure interoperability. To that end, GSWG contributes ideas that further review gap analysis, risk mitigation, and implementation studies of technology standards and implementations. 2011: Year in Review The following table illustrates some of the primary information sharing problems addressed by Global in 2011 and includes the research steps taken, recommendations made, products developed, and examples of real-world applications (or outcomes ) for these Global initiatives. Page 6 of 17

7 Information Sharing Problem Intelligence Capability: Many of the 18,000 law enforcement agencies lack guidance regarding the development and implementation of an intelligence capability. The Criminal Intelligence Coordinating Council, in partnership with the Global Intelligence Working Group, has developed a cadre of products to assist agencies in establishing this capability. Research Steps Recommendations Coordinated CICC and GIWG meetings, conference calls, and Webinars to develop recommendations for the development and implementation of an intelligence capability Leveraged the DOJ, FBI, and DHS initiatives to ensure that the recommended solutions are coordinated with all relevant law enforcement entities Reviewed current research and literature Collaborated with subject-matter experts Vetted resulting products with the appropriate law enforcement entities Products 10 Simple Steps to Help Your Agency Become Part of the National Intelligence Sharing Plan Interagency Threat Assessment and Coordination Group Intelligence Guide for First Responders Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement National Criminal Intelligence Sharing Plan Navigating Your Agency s Path to Intelligence-Led Policing Why Law Enforcement Agencies Need an Analytical Function Provide valuable guidance towards systematically sharing law enforcement information among federal, state, local, and tribal law enforcement agencies large or small Assist state, local, and tribal law enforcement, firefighting, homeland security, and appropriate private sector personnel in accessing and understanding federal counterterrorism, homeland security, and weapons of mass destruction intelligence reporting Support related policy in law enforcement agencies Provide a blueprint to help agencies establish criminal intelligence sharing policies, procedures, standards, technologies, and training Provide guidance regarding the implantation of the intelligence-led policing framework Outcomes The CICC and GIWG have distributed the products to law enforcement agencies throughout the United States via the following mechanisms: o Publishing documents o o Posting online at Collaborating with law enforcement professional organizations, such as the International Association of Chiefs of Police and the Major Cities Chiefs Association, to bring these resources to their members These resources are recognized throughout the law enforcement community as the defining standards for all implementations of intelligence Page 7 of 17

8 Information Sharing Problem Training Guidelines: Training to support the role and responsibilities of intelligence analysts has often been inconsistent. The CICC and GIWG have worked to provide timely, standards-based training guidelines to intelligence analysts that support the goals and objectives of Global and reinforce the priorities of DOJ. Research Steps Recommendations Coordinated CICC and GIWG meetings, conference calls, and Webinars to develop recommendations for the development of analytical training guidelines and products Leveraged existing research and literature Collaborated with subject-matter experts to develop timely, standards-based training products Vetted resulting products with the appropriate law enforcement entities Products Analyst Toolbox Common Competencies for State, Local, and Tribal Intelligence Analysts Law Enforcement Analysts Certification Standards Law Enforcement Analytic Standards Provide analysts with information on the tools they need to effectively and efficiently perform their duties and produce useful intelligence products Identify common analytic competencies that should be exhibited by state, local, and tribal intelligence analysts working in fusion centers or similar analytic law enforcement entities Assist in instituting standards for the intelligence analysis process to ensure that intelligence products are accurate, timely, factual, and relevant, while also recommending implementation of policy and/or action(s) Develop standards that explain the requirements of agencies to adopt the minimum standards for intelligence-led policing in order to support the development of sound, professional, and analytical products Outcomes The CICC and GIWG have distributed the products to law enforcement agencies throughout the United States via the following mechanisms: o Publishing documents o o Posting online at Collaborating with law enforcement professional organizations, such as the International Association of Chiefs of Police and the Major Cities Chiefs Association, to bring these resources to their members These resources are recognized throughout the law enforcement community as the defining standards for intelligence analysts Page 8 of 17

9 Information Sharing Problem Protect Privacy: State, local, and tribal (SLT) justice entities (e.g., law enforcement, fusion centers, courts, corrections, prosecution/defense, and probation/parole) must ensure that privacy, civil rights, and civil liberties protections policies are in place and that procedures are followed for the personally identifiable information that they collect, store, access, and share, as well as for First Amendment-protected events and activities. Research Steps Recommendations Specialized ad-hoc task teams were appointed for the purpose of product development or revision to foundational products. These were populated with privacy professionals from GPIQWG or the CICC s Privacy Committee, depending on the product, as well as subject-matter experts (SMEs) from the field with unique expertise in the topic Leveraged the DOJ, DHS, and ISE-based privacy standards implemented in the DOJ/DHS Fusion Process Privacy TA effort to revise the SLT-focused privacy policy template for use by the broader justice community Products were vetted, reviewed, and approved through their respective working group processes Situational awareness to the Global Advisory Committee (GAC) regarding public protests, as well as to DOJ s P/CL Office Piloted First Amendment products through the New Jersey State Police Extensive research of existing documents, guidelines, and related Web sites Utilized Webinars, conference calls, and online virtual collaboration Web sites for product review and refinement Vetted products through appropriate constituents and Global partners Products The following Global products were developed to support each of the unique steps in a justice entity s privacy effort. While most are designed for the broader justice community, some are tailored for law enforcement or for handling criminal intelligence, tips/leads, and SAR information. Though several were completed in 2010, in 2011 each were featured in an online roadmap format at and in print via the Global Privacy Resources booklet to help users understand which products to use when and for what purpose. Products are listed according to their use and purpose according to the Privacy Program Cycle steps as follows: STEP 1: Educate and Raise Awareness 1. Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development (revised, 2011) 2. 7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy (revised, 2011) 3. The Role of Law Enforcement at First Amendment Events reference card (new, 2011) SLT entities are guided to follow the steps established in the Global Privacy Program Cycle to fully ensure that privacy protections are in place and implemented agencywide. The Global Privacy Program Cycle is a roadmap for which, how, and when to use any of the suite of Global and DOJcollaborated privacy resources available. Entities are encouraged to follow the natural progression of steps in the Global Privacy Program Cycle outlined below and use the Global privacy resources designed for each step: 1. Educate and Raise Awareness 2. Assess Agency Privacy Risks 3. Develop Privacy Protections Policies 4. Perform a Policy Evaluation 5. Implement and Train 6. Conduct an Annual Review This information is available online at and in print. Outcomes The following is a sampling of the numerous outcomes of the development and distribution of the above-described products: By March 31, 2011, as part of a three-year DOJ/DHS-supported Fusion Center Privacy TA effort, all 72 of the designated fusion centers had finalized privacy policies in compliance with DHS requirement to be at least as comprehensive as the ISE Privacy Guidelines. Each of the 72 centers used the Global Fusion Center Privacy Template listed in Step 3, above. The Indiana Data Exchange (IDEx) statewide information sharing system utilized all of the Global privacy products, as well as received on-site privacy technical assistance from Global Privacy TA providers, to develop a comprehensive privacy, civil rights, and civil liberties privacy policy for their statewide IDEx justice information sharing project. Late in 2011, South Dakota s statewide justice information system, SD Connect, began strategy and planning meetings with Global Privacy TA providers to develop a SD Connect Privacy Policy (completed in February 2012) utilizing the Global Privacy Resources described above. Page 9 of 17

10 STEP 2: Assess Agency Privacy Risks 1. Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Justice Entities (revised, 2011) STEP 3: Develop Privacy Protections Policies 1. Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities (Privacy Guide) (revised, 2011) 2. Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities (SLT Privacy Template) (revised, 2011) 3. Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template (Fusion Center Privacy Template) (2010) 4. Law Enforcement Guidelines for First Amendment-Protected Events; Recommendations for First Amendment-Protected Events for State and Local Law Enforcement Agencies (new, 2011) 5. The Protection of Privacy, Civil Rights, and Civil Liberties in the Use of Social Media by Law Enforcement in Intelligence and Investigative Activities guidance document (new draft, 2011) STEP 4: Perform a Policy Evaluation 1. Policy Review Checklist (new, 2011) STEP 5: Implement and Train Implement 1. Implementing Privacy Policy in Justice Information Sharing: A Technical Framework (2007, pilot in 2011) 2. Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise (2010, field use in 2011 fusion center evaluations) Train 3. The Importance of Privacy, Civil Rights, and Civil Liberties Protections in American Law Enforcement and Public Safety (Line officer training video) (new, 2011) 4. Suspicious Activity Reporting Line Officer Training CD (new, 2011) STEP 6: Conduct an Annual Review 1. Policy Review Checklist (new, 2011) More than 3,000 law enforcement First Amendment event reference cards were distributed for working demonstrations. Copies of appropriate products were distributed to the 72 designated fusion centers as well as to relevant law enforcement entities. Page 10 of 17

11 Information Sharing Problem Privacy in Biometrics: As justice entity use of biometric technology expands, it is critical that justice agencies ensure that their policies and procedures for the collection, quality, retention, use, analysis, and sharing of biometric information address both privacy, civil rights, and civil liberties protections as well as information quality. Research Steps Recommendations Ad-hoc task teams appointed with GPIQWG privacy experts and biometric SMEs (fingerprint, iris, DNA, and familial DNA searching experts) Global Privacy TA providers completed field research through a case study with the Colorado Bureau of Investigation to develop their familial DNA searching privacy policy. Research was used to develop a Global familial DNA searching privacy template for all justice entities. Extensive research of existing documents, guidelines, and related Web sites Vetted biometric products through FBI CODIS, FBI Biometric Center of Excellence, NIJ, crime lab directors, as well as DOJ GPIQWG member review and approval Products The following are privacy biometric products developed by Global: Privacy and Information Quality Risks: Justice Agency Use of Biometrics (new, 2011) An Introduction to Familial DNA Searching for State, Local, and Tribal Justice Agencies: Issues for Consideration (F-DNA Issue Paper) (new, 2011) Privacy Principles of Familial DNA Searching: Privacy, Civil Rights, and Civil Liberties Policy Development Template (F-DNA Privacy Template) (draft, 2011) Justice agencies using biometrics should ensure that they have policies to address privacy, civil rights, and civil liberties, as well as information quality (IQ). Entities are guided to perform an evaluation of the privacy and IQ risks associated with biometric use using Global s biometric privacy and IQ assessment frameworks. Entities considering implementing familial DNA searching must be aware of the key privacy issues associated with justice use of this forensic technique. Entities that are implementing familial DNA searching should draft a privacy policy for this capability. Outcomes The following are outcomes of the development of the above products: Completed a privacy policy case study with the Colorado Bureau of Investigation (CBI) familial DNA search capability now the only state to have a privacy protections policy covering familial DNA searching. Arizona Forensic Science Advisory Committee and the Springfield, Illinois, Crime Lab have both requested and distributed printed copies of the F-DNA Issue Paper. Illinois State Police articulated interest in developing a privacy policy, using the F-DNA Privacy Template, once it is available in print (2012). Since the debut of Global F-DNA products, these states have implemented or are actively pursuing the implementation of familial DNA searching: Virginia, Texas, West Virginia, Pennsylvania, Oklahoma, Wyoming, Illinois, and Florida. These are anticipated to utilize the Global F-DNA products. Page 11 of 17

12 Information Sharing Problem Fusion Center Support and Guidance: Coordinating and aligning fusion center policies and procedures across the national network of fusion centers is a critical issue for the justice community. These efforts seek to ensure that these centers remain an effective and efficient mechanism to exchange vital information, while maximizing resources, streamlining operations, and improving the ability to fight crime and terrorism by analyzing data from a variety of sources. Research Steps Recommendations Collaborated with other federal agency partners (FBI, DHS, ODNI, PM-ISE, ATF, and others), as well as fusion center leaders to prioritize and develop training and technical assistance for fusion centers Held Global Advisory Committee and Working Group meetings to vet, review, and approve recommendations and products Researched current issues impacting fusion centers Ensured that every fusion center has access to the collaboratively developed products Provided input to the federal government in its efforts to develop and share criminal intelligence Recommended a framework for implementing and ensuring the longevity of the standards-based intelligence plan, training and technology coordination, outreach and education, and resource coordination Products The following Global products were developed to support the coordination and alignment of fusion center policies and procedures and to assist centers in complying with the National Criminal Intelligence Sharing Plan and Baseline Capabilities for State and Major Urban Area Fusion Centers. While most products are designed for fusion center use, some are applicable to the larger law enforcement and justice community. Fusion Process Program Communications and Outreach Guidebook Health Security: Public Health and Medical Integration for Fusion Centers, An Appendix to the Baseline Capabilities for State and Major Urban Area Fusion Centers; Health Security Public Health and Medical Integration for Fusion Centers Guidebook Integrating Critical Infrastructure and Key Resources Protection Capabilities Into Fusion Centers Development and Implementation Considerations Guidebook Fusion Centers: Enabling Information Sharing Between the Federal Government and State, Local, Tribal, and Territorial Partners video Customized tri-folds regarding fusion center DHS/DOJ Fusion Process Technical Assistance Program and Services Fusion Center (including multiple training and technical assistance offerings) Continue to support the unprecedented federal agency partnership with fusion centers through the provision of collaborative meetings, issue-resolving focus groups, training, and technical assistance Develop a series of resources to support the mission of fusion centers and other related initiatives, including the development of analyst standards In collaboration with DHS, create a robust training and technical assistance program for fusion centers Work to deliver the training and technical assistance offerings Develop general outreach and awareness products for fusion centers Work to integrate nontraditional information sharing partners (e.g., health, fire, and EMS) into the fusion center effort Outcomes The following are outcomes of the development of the above products in FY2011: Twenty-three fusion centers requested the Fusion Centers: Enabling Information Sharing Between the Federal Government and State, Local, Tribal, and Territorial Partners video to support their operational requirements. Four fusion centers were provided with customized tri-fold brochures regarding their centers. These brochures were used by the fusion centers to promote awareness of the fusion centers purpose and goals within their communities. DHS/DOJ Fusion Process Technical Assistance Program and Services were offered to all 77 designated fusion centers and by March 31, 2011, 72 had approved privacy policies. Peer-to-peer pilot evaluations, followed by on-site formal center evaluations, were performed at several fusion centers across the country using the Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise. Copies of appropriate products were distributed to the 77 designated fusion centers as well as to relevant law enforcement entities. Resources were used to integrate nontraditional information sharing partners into the fusion center effort in a consistent manner across the national network of fusion centers. Page 12 of 17

13 Information Sharing Problem Reference Architecture: Many justice and public safety organizations do not possess sufficient resources to support the research, design, and implementation of information sharing programs. This issue becomes particularly important as practitioners seek to launch information exchange programs. To alleviate the multitude of issues related to this effort, it is critical that standards and processes be developed to minimize cost and maximize the opportunities for building these exchanges. Research Steps Recommendations Collaborated with subject-matter experts to identify the most current research, protocols, processes, and practices Researched similar solutions provided by industry and educational institutions Identified priority focus areas (i.e., exchanging warrant and disposition data to relevant justice partners in a safe, timely, and accurate manner) Held working group and specialized task team meetings to design and develop products Developed the Global Reference Architecture (GRA), which provides guidance for identifying, defining, implementing, and governing services to enhance justice and public safety through a service-oriented approach to information sharing Supported the provision of specialized training and technical assistance to demonstrate the benefit of implementing the identified solutions Products The Global Reference Architecture (GRA), a service-oriented reference architecture for justice and public safety information sharing, was developed to benefit the field by decreasing the time and effort necessary to develop and establish a service-oriented architecture. The GRA suite of products includes numerous policy-level documents as well as a multitude of service specifications and guidance documents designed to assist jurisdictions in implementing the GRA. Many of these products were developed and/or refined in 2011, including the following: 1. GRA Frequently Asked Questions 2. GRA Specification, Version GRA Web Services Service Interaction Profile, Version GRA ebxml Messaging Service Interaction Profile, Version GRA Guidelines for Identifying and Designing Services, Version GRA Execution Context Guidelines, Version GRA Reliable Secure Web Services Service Interaction Profile, Version GRA Framework, Version GRA Service Specification Guidelines, Working Draft Version GRA Service Specification Package, Working Draft Version GRA Information Sharing Enterprise Statement of Participation, Version GRA Information Sharing Enterprise Service-Level Agreement, Version 1.1 Support the Global Reference Architecture (GRA) as an information exchange solution designed to cut 80 percent of implementation time and costs for state and local justice agencies through the reuse of established promising practices in IT architecture and design. Outcomes The GRA is being utilized by justice and public safety entities around the country, including the CONNECT Project, which is a consortium of states implementing a new approach to interstate information sharing. Through the use of GRA, business services enable search and information exchange between portal and architecture leverages reusable infrastructure and security token services. Since adopting the GRA, the Commonwealth of Pennsylvania Justice Network (JNET) is well positioned to more quickly meet the needs of and provide value to its many business partners. The shared services and common GRA approach promotes interoperability across the JNET partnering agencies. For example, JNET utilized the GRA to create a consolidated warrant search capability to reduce the number of required warrant inquiries from three to one. As a result, each warrant search now saves approximately four minutes per offender by reducing the number of transactions and the manual time necessary to consolidate the results from the three separate data sources and systems. The agencies using this consolidated search can now redeploy 9,400 man-hours a year to perform other tasks. Page 13 of 17

14 Information Sharing Problem Federated Identity and Privilege Management: Achieving information sharing objectives requires that partners establish wide-scale electronic trust among the caretakers of critical information and those who need and are authorized to use that information. There is a need for interoperable security functions for authentication and privilege management to govern information exchange among cross-domain justice information sharing systems. Research Steps Recommendations Collaborated with subject-matter experts to identify the most current research, protocols, processes, and practices Researched similar solutions provided by industry and educational institutions Held working group and targeted task team meetings to develop solutions Developed the Global Federated Identity and Privilege Management (GFIPM) framework, a series of resources that address the specific information exchange issues faced by the justice community. Federated identity allows a user's roles, rights, and privileges to be communicated securely in the justice community and, in particular, to those who hold the information required to effectively safeguard our nation. Products The Global Federated Identity and Privilege Management (GFIPM) framework provides the justice community and partner organizations with a standardsbased approach for implementing federated identity and privilege management. Many of these products were developed and/or refined in 2011, including the following: 1. GFIPM Choosing the Right Federation 2. GFIPM Overview 3. GFIPM Document Map 4. GFIPM Governance Guidelines 5. GFIPM Operational Policies and Procedures Guidelines 6. GFIPM Implementation Guide 7. GFIPM Web Services Concept of Operations 8. GFIPM Terminology Matrix 9. GFIPM Metadata GFIPM Cryptographic Trust Model 11. GFIPM Federation Certification Practice Statement Template Ensure compatibility by collaborating with other key ongoing projects that cross domain boundaries, such as the National Information Exchange Model, the Office of the Director of National Intelligence, and the Law Enforcement Information Sharing Program Recognize the GFIPM as the recommended approach for the development of interoperable security functions for authentication and privilege management for information exchange among cross-domain justice information sharing systems Adopt the GFIPM: A Global Concept Activities and Progress Report as a recommended resource for the next steps and activities to further the utility of GFIPM for the justice community Encourage members of the justice community to consider the GFIPM as a potential building block to a layered security solution when authenticating uses among cross-domain organizations Outcomes The GFIPM has been adopted by numerous information sharing projects around the country, including the CONNECT Project, which is a consortium of states implementing a new approach to interstate information sharing. CONNECT utilizes the GFIPM to enable policy-driven, claims-based identification, authentication, authorization, and access control. The Indiana Data Exchange (IDEx) Project, Indiana Department of Homeland Security (IDEx), a 21-agency effort, includes local, state, and federal agency participation. The IDEx project used the broad range of Global solutions, including the Global Privacy Resources, the GRA, the GFIPM, and the National Information Exchange Model (NIEM). The initiative connects disparate justice and public safety systems data for enhanced decision making and increased public safety, leveraging existing investments. Through the IDEx Return on Investment (ROI) report, a comprehensive ROI study, IDEx exemplifies how a state can use federal support to initiate an effort that results in immediate and long-term cost savings and efficiencies. Page 14 of 17

15 Results and Success Stories Bridging agency boundaries, throughout all levels of government, Global creates collaboratively developed solutions that are beneficial to everyday justice work and cost-effective because they offer proven results that can be replicated across the nation. Global solutions have seen consistent adoption by justice and public safety jurisdictions across the country and internationally. Adoption of Global solutions has greatly helped support advancement in interoperability and the ability to better share information. An officer assigned to the case of two slain New York City detectives contacted the Philadelphia/Camden High Intensity Drug Traffic Area authorities to request information on two suspects. Using JNET, Pennsylvania s Justice Network, built on the work of the National Information Exchange Model (NIEM), which was developed from the work of the Global Standards Council partners, officials needed just a few hours, rather than days or weeks, to gather and forward information on the suspects, including dates of birth, social security numbers, fingerprints, photos, and vehicles. As a result, the two suspects were located and brought into custody. Global has been instrumental in the Nationwide SAR Initiative. Leveraging of Globalsupported tools and solutions including Global privacy policy resources, NIEM, Global Federated Identity and Privilege Management, Global Reference Architecture, and the Fusion Center Guidelines has expedited NSI implementation. Current efforts are directed toward establishing a national capacity for gathering, documenting, processing, analyzing, and sharing SARs in a behavior-based, evaluative approach grounded in known precursor activity. The SAR process focuses on what law enforcement agencies have been doing for years gathering information regarding behaviors and incidents associated with crime to connect the dots and establishes a standardized approach to sharing information, with the goals of detecting and preventing criminal activity, including information associated with domestic and international terrorism. Global Advisory Committee 2012 Future Activities In 2012, DOJ will continue to pursue its goals and objectives with support from the GAC by building on its achievements, leveraging existing resources, and continuing to help engage the entire justice community in the information sharing dialogue. Global recommendations are important for justice information sharing across all disciplines, at all levels of government. The GAC is charged with advising and providing recommendations to the U.S. Attorney General on advancing the use of technology, standards, and collaboration between agencies/organizations to ensure consistent policies and business rules and the continued successful pursuit of broad-scale, justice-related information sharing. In late 2011, in support of this charge, members of the GESC identified key issue areas and priority capabilities for Global attention: Page 15 of 17

16 Capability: Develop single-sign-on/federated query capabilities At a recent national conference of state, local, and tribal (SLT) law enforcement executives and information technology (IT) managers, this was the number one request. Capability: Leverage cloud solutions Applying cloud solutions provides maximum business agility while minimizing implementation and maintenance costs. Cloud solutions (whether public and/or private) also enable small justice organizations to gain business capabilities they otherwise could not afford and inherently support open standards and reuse. Capability: Develop and engage in shared services The use of shared services, such as regional or multiagency analysis or communications capabilities, can save agency resources while avoiding duplication. Shared services also can provide smaller agencies with resources they otherwise cannot afford. Issue: Ensure interoperability between law enforcement deconfliction systems Mutual aid and other partnership arrangements serve as methods of deconfliction. Standards are necessary to ensure that separate deconfliction systems are interoperable, with a single sign-on capability, to promote officer safety and strengthen law enforcement operations/investigations. Issue: Advance information sharing to support successful reentry of formerly incarcerated individuals According to the Bureau of Justice Statistics, more than half of the individuals released from incarceration will be in some form of legal trouble within three years; in California, rereleases recidivate at an even higher rate. To protect public safety and reduce recidivism, there is a renewed emphasis on supporting the success of reentry initiatives. Innovative pilot sites promote sharing of appropriate data related to formerly incarcerated individuals in a comprehensive case management approach across multiple domains. Partnerships: IT Initiatives DOJ looks forward to the ongoing support of GAC in integration activities. BJA has contributed greatly to the field by supporting the development of standards processes, privacy policy, information architecture, and outreach vehicles (e.g., the IT.OJP.GOV Web site). Facilitating Full Participation for All Disciplines To reach the full information sharing capability envisioned by DOJ, all disciplines involved in justice-related efforts including public safety constituencies must employ information technology among their members. Historically, some disciplines and communities have had difficulties in obtaining resources to acquire and implement appropriate information systems; for example, probation, parole, public defense, pretrial services, and Indian Country agencies. While not detracting in any way from other efforts, attention should be given to identifying and addressing the technological needs of these disciplines (and others) to enable them to be full participants in broad-scale justice information sharing. To continue capitalizing on the ideals of inclusiveness and strength through diversity, as an ongoing task committee members will scan the justice and public safety landscapes for unrepresented or underrepresented constituencies. When necessary, additional organizations will be nominated through BJA for GAC membership. Page 16 of 17

The National Network of Fusion Center: Where We Have Been and Where We are Going

The National Network of Fusion Center: Where We Have Been and Where We are Going The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National

More information

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This

UNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES

SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES Dru Sjodin National Sex Offender Public Website Updates to the public website are in development to meet the

More information

Statement of Chief Richard Beary President of the International Association of Chiefs of Police

Statement of Chief Richard Beary President of the International Association of Chiefs of Police Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of

More information

NATIONAL INFORMATION SHARING STRATEGY

NATIONAL INFORMATION SHARING STRATEGY The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides

More information

Kansas City s Metropolitan Emergency Information System (MEIS)

Kansas City s Metropolitan Emergency Information System (MEIS) Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)

More information

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America

More information

Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts

Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts Office for Interoperability and Compatibility Emergency Interoperable Standards Efforts 8th Annual Technologies for Critical Incident Preparedness Conference and Exposition Chip Hines Director, Office

More information

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT

Mitigation Framework Leadership Group (MitFLG) Charter DRAFT Mitigation Framework Leadership Group (MitFLG) Charter DRAFT October 28, 2013 1.0 Authorities and Oversight The Mitigation Framework Leadership Group (MitFLG) is hereby established in support of and consistent

More information

NSI. Suspicious Activity Reporting Line Officer Training

NSI. Suspicious Activity Reporting Line Officer Training Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding

More information

NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing

NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing The National Information Exchange Model (NIEM) A Presentation to the IACP-LIEM Conference May 9, 2008 Nashville, TN Paul Wormeli,

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)

TERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP) To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the

More information

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)

TESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT

More information

STRATEGIC PLAN. USF Emergency Management

STRATEGIC PLAN. USF Emergency Management 2016-2020 STRATEGIC PLAN USF Emergency Management This page intentionally left blank. Organization Overview The Department of Emergency Management (EM) is a USF System-wide function based out of the Tampa

More information

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013

Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 Presented by the Federal Interagency Elder Justice Working Group May 13, 2013 The inaugural meeting of the Elder Justice Coordinating Council took place in October 2012 Fall meeting agenda determined with

More information

WHITE PAPER ON THE DEPARTMENT OF JUSTICE GLOBAL ADVISORY COMMITTEE

WHITE PAPER ON THE DEPARTMENT OF JUSTICE GLOBAL ADVISORY COMMITTEE WHITE PAPER ON THE DEPARTMENT OF JUSTICE GLOBAL ADVISORY COMMITTEE INTRODUCTION: For more than a decade, the U.S. Department of Justice s (DOJ) Global Justice Information Sharing Initiative (Global) Advisory

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Microsoft White Paper

Microsoft White Paper Microsoft White Paper Transforming the Criminal Justice Enterprise: Technology Best Practices Prepared for Criminal Justice Practitioners and CIO s December 20, 2011 Authors: Timothy Galante Brian Mattson,

More information

GAO INFORMATION SHARING ENVIRONMENT

GAO INFORMATION SHARING ENVIRONMENT GAO United States Government Accountability Office Report to Congressional Requesters June 2008 INFORMATION SHARING ENVIRONMENT Definition of the Results to Be Achieved in Improving Terrorism-Related Information

More information

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI)

Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide SAR Initiative (NSI) Responds directly to the Intelligence Reform and Terrorism Prevention Act of 2004 and to the direction of

More information

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014

JSC THE JUSTICE & SAFETY CENTER. Snapshot 2014 JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Global Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants

Global Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants Global Reference Architecture: Overview of National Standards Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants Goals for this Presentation Define the Global Reference Architecture

More information

Privacy, Civil Rights, and Civil Liberties 101 December 10, 2012

Privacy, Civil Rights, and Civil Liberties 101 December 10, 2012 Privacy, Civil Rights, and Civil Liberties 101 December 10, 2012 e-courts 2012 Conference - Las Vegas, NV National Center for State Courts The Honorable Anthony Capizzi Montgomery County, Ohio, Juvenile

More information

Department of Homeland Security Updates

Department of Homeland Security Updates American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department

More information

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

ANZPAA National Institute of Forensic Science BUSINESS PLAN

ANZPAA National Institute of Forensic Science BUSINESS PLAN ANZPAA National Institute of Forensic Science BUSINESS PLAN 2018 19 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate

More information

Collaboration Trail - how Corrections information is shared. CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014

Collaboration Trail - how Corrections information is shared. CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014 Collaboration Trail - how Corrections information is shared CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014 Agenda Introductions Why Collaborate? Along the Collaboration Trail

More information

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud. PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness

More information

Nationwide Suspicious Activity Reporting. Crime Stoppers USA Training Conference New Orleans September 2018

Nationwide Suspicious Activity Reporting. Crime Stoppers USA Training Conference New Orleans September 2018 Nationwide Suspicious Activity Reporting Crime Stoppers USA Training Conference New Orleans September 2018 2 NSI Project Partners If You See Something, Say Something Campaign Overview Launched in 2010

More information

FEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION

FEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION FEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION SEARCH MEMBERSHIP MEETING July, 2011St. Louis, Mo. David Gavin Current State of Criminal Justice Information Sharing However beautiful the strategy,

More information

Department of Justice Policing and Victim Services BUSINESS PLAN

Department of Justice Policing and Victim Services BUSINESS PLAN Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.

More information

GUIDING PRINCIPLES I. BACKGROUND. 1 P a g e

GUIDING PRINCIPLES I. BACKGROUND. 1 P a g e GUIDING PRINCIPLES I. BACKGROUND At the Summit of the Americas held in Port-of-Spain, Trinidad and Tobago, in April 2009, the leaders of the Western Hemisphere noted that energy challenges are among the

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season

STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season STANDARD OPERATING PROCEDURE Critical Infrastructure Credentialing/Access Program Hurricane Season IBERIA PARISH STATE OF LOUISIANA STANDARD OPERATING PROCEDURE Critical Infrastructure Owners/Operators

More information

Disaster Management (DM) Program Overview

Disaster Management (DM) Program Overview Disaster Management (DM) Program Overview Presented to Governing Board of the National Public Safety Telecommunications Council Chip Hines Program Manager Disaster Management e-gov Initiative Science and

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

ENTERPRISE ARCHITECTURE

ENTERPRISE ARCHITECTURE ENTERPRISE ARCHITECTURE Executive Summary With more than $1 billion in information technology investments annually, the Commonwealth of Pennsylvania has evolved into the equivalent of a Fortune 20 organization,

More information

Five-Year Strategic Plan

Five-Year Strategic Plan Five-Year Strategic Plan 2016 2020 Contents A Message from the ERIS Board... 3 Introduction and Background... 4 Five-Year Plan Goal Areas... 7 Goal Area 1: State Environmental Agency Research Needs and

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard

Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal Ed Reed Matthew G. Devost Neal Pollard May 11, 2005 Vision The Terrorism Early Warning Group concept fulfills the intelligence

More information

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011

Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins

More information

Karyn Higa-Smith, Research Program Manager

Karyn Higa-Smith, Research Program Manager Personal Identity Verification- Interoperability/ First Responder Authentication Credential (PIV-I/FRAC) I/FRAC) Technology Transition Work Group (TTWG) Karyn Higa-Smith, Research Program Manager Identity

More information

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division

Critical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal

More information

Public Safety Communications Evolution

Public Safety Communications Evolution Public Safety Communications Evolution November 2011 CURRENT TRANSITION DESIRED EVOLUTION Indefinite Time Frame Long Term Land Mobile Radio Networks Mission Critical Voice Mission Critical Data Public

More information

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017

FIRE REDUCTION STRATEGY. Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 FIRE REDUCTION STRATEGY Fire & Emergency Services Authority GOVERNMENT OF SAMOA April 2017 2 1. Introduction The

More information

JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION

JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION PRESENTED BY: Leon Frederick, CIO, Iowa Department of Public Safety Liz Pearson, URL Integration PRESENTATION OVERVIEW What is N-DEx? What is Iowa

More information

The U.S. National Spatial Data Infrastructure

The U.S. National Spatial Data Infrastructure June 18, 2014 INSPIRE Conference 2014 The U.S. National Spatial Data Infrastructure past present and future Ivan B. DeLoatch Executive Director, Federal Geographic Data Committee U.S. Geological Survey

More information

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

ASCLD STRATEGIC PLAN

ASCLD STRATEGIC PLAN 1 ASCLD 2016-2017 STRATEGIC PLAN ASCLD Board of Directors http://www.ascld.org/ 2 ASCLD S MISSION To promote the effectiveness of crime laboratory leaders throughout the world by: facilitating communication

More information

EGM, 9-10 December A World that Counts: Mobilising the Data Revolution for Sustainable Development. 9 December 2014 BACKGROUND

EGM, 9-10 December A World that Counts: Mobilising the Data Revolution for Sustainable Development. 9 December 2014 BACKGROUND A World that Counts: Mobilising the Data Revolution for Sustainable Development 9 December 2014 BACKGROUND 1 Creation of the group Establishment of an Independent Expert Advisory Group on the Data Revolution

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions

alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions alliance FROM DISPATCH THROUGH DISPOSITION Tyler Alliance Leads the Way with Integrated Criminal Justice and Public Safety Solutions FIRE/EMS Fire and emergency service teams access information faster

More information

Donor Countries Security. Date

Donor Countries Security. Date PERU Last updated date: 8/10/2017 OAS Pillar Name of Activity Target Beneficiaries Security Inter-American Network for the Prevention of Violence and Crime OAS 34 Member States Guatemala Additional Information

More information

Legal and Regulatory Developments for Privacy and Security

Legal and Regulatory Developments for Privacy and Security Legal and Regulatory Developments for Privacy and Security Rodney Petersen Government Relations Officer and Director of EDUCAUSE Cybersecurity Initiative Overview Context for Federal Policy Policy Directions

More information

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda

Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 2016 PARTNERSHIP FORUM Promoting accountability and transparency of multistakeholder partnerships for the implementation of the 2030 Agenda 31 March 2016 Dialogue Two (3:00 p.m. 5:45 p.m.) ECOSOC CHAMBER,

More information

ASHRAE. Strategic Plan STARTING APPROVED BY ASHRAE BOARD OF DIRECTORS JUNE 24, 2014

ASHRAE. Strategic Plan STARTING APPROVED BY ASHRAE BOARD OF DIRECTORS JUNE 24, 2014 ASHRAE Strategic Plan STARTING 2014 APPROVED BY ASHRAE BOARD OF DIRECTORS JUNE 24, 2014 2 ASHRAE Strategic Plan STARTING 2014 INTRODUCTION ASHRAE has committed to a strategic planning process designed

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

Smart Policing and Technology Applications

Smart Policing and Technology Applications Smart Policing and Technology Applications Presentation at the IACP LEIM Conference San Diego, California June 15,2011 This project was supported by Grant No. 2009-DG-BX-K021 awarded by the Bureau of Justice

More information

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015

STRATEGIC PLAN VERSION 1.0 JANUARY 31, 2015 VERSION 1.0 JANUARY 31, 2015 2015-2018 STRATEGIC PLAN NATIONAL ALLIANCE FOR PUBLIC SAFETY GIS FOUNDATION 1250 24TH STREET NW SUITE 300 WASHINGTON, DC 20037 2015-2018 STRATEGIC PLAN VISION A Nation of emergency

More information

Executive Summary and Overview

Executive Summary and Overview A Cross-Sector Capabilities, Resources, and Needs Assessment: Research to Support the Drafting of the Oregon Cybersecurity Center of Excellence Proposal Executive Summary and Overview Updated April 2018

More information

National Strategy for CBRNE Standards

National Strategy for CBRNE Standards National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies: ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications

More information

Dane County Criminal Justice Council Data-Sharing Project Progress Report

Dane County Criminal Justice Council Data-Sharing Project Progress Report Dane County Criminal Justice Council Data-Sharing Project Progress Report February 2018 Prepared for Dane County Criminal Justice Council Dane County, Wisconsin The Dane County Criminal Justice Council

More information

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters

Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters Quadrennial Homeland Security Review (QHSR) Ensuring Resilience to Disasters QHSR Background Implementing Recommendations of the 9/11 Commission Act of 2007 directed DHS to Conduct a Quadrennial Homeland

More information

HPH SCC CYBERSECURITY WORKING GROUP

HPH SCC CYBERSECURITY WORKING GROUP HPH SCC A PRIMER 1 What Is It? The cross sector coordinating body representing one of 16 critical infrastructure sectors identified in Presidential Executive Order (PPD 21) A trust community partnership

More information

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment SWG G 3 2016 v0.2 ISAO Standards Organization Standards Working Group 3: Information Sharing Kent Landfield, Chair

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015

National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the

More information

Mission Statement: Cuyahoga County Department of Justice Affairs

Mission Statement: Cuyahoga County Department of Justice Affairs Cuyahoga County Department of Justice Affairs Mission Statement: Providing hope and opportunity for a safer community, ensuring justice, support and recovery for all citizens Cuyahoga County Department

More information

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC

NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC NATIONAL CAPITAL REGION HOMELAND SECURITY STRATEGIC PLAN SEPTEMBER 2010 WASHINGTON, DC Draft Version incorporating Management Review [MR] Edits and Comments Document Date: July 2013 Goal One: Ensure Interoperable

More information

Security Director - VisionFund International

Security Director - VisionFund International Security Director - VisionFund International Location: [Europe & the Middle East] [United Kingdom] Category: Security Job Type: Open-ended, Full-time *Preferred location: United Kingdom/Eastern Time Zone

More information

Architecture and Standards Development Lifecycle

Architecture and Standards Development Lifecycle Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page

More information

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS

THE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical

More information

GAO. Testimony Before the Committee on Homeland Security and Governmental Affairs, U.S. Senate

GAO. Testimony Before the Committee on Homeland Security and Governmental Affairs, U.S. Senate GAO For Release on Delivery Expected at 10:00 a.m. EDT Wednesday, July 23, 2008 United States Government Accountability Office Testimony Before the Committee on Homeland Security and Governmental Affairs,

More information

Mapping to the National Broadband Plan

Mapping to the National Broadband Plan The National Telecommunications and Information Administration Mapping to the National Broadband Plan 37 th Annual PURC Conference Smart Technology vs. Smart Policy February 3, 2010 1 About NTIA The National

More information

Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships.

Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships. Critical Infrastructure Mission Implementation by State, Local, Tribal, and Territorial Agencies and Public-Private Partnerships May 17, 2016 Overview Regional Overview Project Overview Background and

More information

CONCLUSIONS AND RECOMMENDATIONS

CONCLUSIONS AND RECOMMENDATIONS Chapter 4 CONCLUSIONS AND RECOMMENDATIONS UNDP and the Special Unit have considerable experience in South-South cooperation and are well positioned to play a more active and effective role in supporting

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

Assistant Secretary-General Michèle Coninsx Executive Director, CTED High-Level Conference of Heads of Counter-Terrorism Agencies Opportunities and challenges in strengthening international cooperation through the sharing of information, expertise and resources United Nations

More information

July 13, Via to RE: International Internet Policy Priorities [Docket No ]

July 13, Via  to RE: International Internet Policy Priorities [Docket No ] July 13, 2018 Honorable David J. Redl Assistant Secretary for Communications and Information and Administrator, National Telecommunications and Information Administration U.S. Department of Commerce Washington,

More information

Department of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise

Department of Homeland Security Customs and Border Protection. Centers of Excellence and Expertise Department of Homeland Security Customs and Border Protection Centers of Excellence and Expertise 1 Center Mission Statement The Centers of Excellence and Expertise strengthen America s economic competitiveness

More information

Woolwich CHC adopts the CIW as a strategic planning tool. A tool to shift the conversation. Using the CIW to advance community health and wellbeing

Woolwich CHC adopts the CIW as a strategic planning tool. A tool to shift the conversation. Using the CIW to advance community health and wellbeing Advancing health and wellbeing for individuals, families and communities AOHC and its members are using the Canadian Index of Wellbeing (CIW) as a powerful tool to support their efforts in making health

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

Global Security Advisor

Global Security Advisor Global Security Advisor Location: [North America] [United States] Category: Security *Preferred location: USA. Other locations will be considered globally where WVI is registered to operate. PURPOSE OF

More information

National Counterterrorism Center

National Counterterrorism Center National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate

More information

ACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families

ACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families ACF Interoperability Human Services 2.0 Overview August 2011 David Jenkins Administration for Children and Families Interoperability: An Operational Definition Creating a Health and Human Service System

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information