Applied Coursework. Technology for Homeland Security Course Paper. Author: David Heller Cohort 0801/0802. Lead Instructor: Richard Bergin
|
|
- Debra Snow
- 5 years ago
- Views:
Transcription
1 Applied Coursework Technology for Homeland Security Course Paper Author: David Heller Cohort 0801/0802 Lead Instructor: Richard Bergin The Nation s Homeland Security Educator Learn more about the CHDS Master s Degree Program: Website: chdsmaap@nps.edu Phone:
2 Naval Postgraduate School Technology for Homeland Security COHORT 802:IS4010 David E. Heller Research Paper: Leveraging Technology to Track State, Local & Tribal Domestic Terrorism Subjects (3.2.1) Information sharing and collaboration capabilities to enable effective prevention, protection, response, and recovery activities: The Federal Bureau of Investigation s (FBI) mission is to protect and defend the United States against terrorism, foreign intelligence threats, and to uphold and enforce the criminal laws of the United States. In combating Domestic Terrorism (DT), however, the United States has not implemented an adequate process to designate DT groups or individuals or to track and share information concerning those individuals. This failure to define such a process may have a deleterious affect of law enforcement impinging on the First Amendment Rights of our citizens: The Right of Free Speech, Free Exercise of Religion, and Right of Assembly. Defending the United States from terrorism and protecting our citizen s Constitutional Rights are not mutually exclusive. To the contrary, by properly defining the process of designating a DT group or individual and a universal system to share information, law enforcement will be able to avoid a Hobson s Choice of impinging upon First Amendment Rights so as to defend the nation against another Oklahoma City bombing. The FBI has the unique responsibility for identifying and investigating DT within the United States. The FBI s role in investigating DT has been defined within numerous government Presidential Directives and legislative actions. States have also developed laws and legislation providing for local law enforcement to take action against DT
3 activities within its own jurisdictions. In September of 2003, President Bush signed Homeland Security Presidential Directive (HSPD) 6 which directed the Attorney General to establish a process to consolidate the Government's approach to terrorism screening and provide for the appropriate and lawful use of Terrorist Information in a screening process. This directive led to the so named Watch List which is primarily used for affecting suspected terrorists travel. A second list, known as the Violent Gang/Terrorist Organization File (VGTOF), was established to track and identify gang members and terrorists. To date, these lists are the only repositories for the FBI and limited federal government entities to externally publish or identify DT subjects. To date there is no system/process for the tracking of state, local or tribal DT subjects. For the purpose of moving forward the FBI should accept there is significant ambiguity between the defining laws and regulations which address DT investigations and intelligence collection across the nation. This type of investigative diversity traditionally does not lend itself as an efficient process for connecting the dots. Conversely, the collection and retention of intelligence, when U.S. citizens are the target, promulgate significant First Amendment legal challenges further emphasizing the need for uniformity throughout the nation. Although this process has not yet failed catastrophically, the FBI should recognize the vulnerabilities and not wait for failure. Therefore, the FBI should leverage current technology combined with state, local and tribal policies and procedures for the purpose of information sharing, collaboration and full visibility of DT subjects across the nation. The Law Enforcement National Data Exchange (N-DEx) is a viable information technology system currently being deployed by the FBI which could be leveraged as a
4 platform for national information sharing concerning all DT subjects and investigations. The N-DEx information sharing platform houses law enforcement data with specific standardized elements. These data elements will be capable of capturing information which may be utilized to track DT adherents. When N-DEx reaches maturity, over the next three years, it will provide unprecedented accessibility to information across all local, state, tribal and federal agencies as depicted by the diagram below. Inciident/Case Reports Warrants Arrests FBI CJIS Local/ State/ Federal/ Tribal/Regional Systems N-DEx NCIC II IAFIS DOJ Data OneDOJ 18,000 LE Agencies 3,200 SO Agencies 50 State DOC Although N-DEx was not developed for the purpose of tracking DT adherents, this research paper suggests, after a detailed study of the system and technology, N-DEx has the capabilities to do so. By leveraging the N-DEx platform the FBI can continue to enhance the terrorism screening process as detailed within HSPD 6.
5 Curre nt Technologies The criteria for information sharing within the law enforcement community are broken down in two primary areas; secure networks and trusted partners. Prior to the development of the internet, data transfer/streams between law enforcement agencies were usually accomplished by hard copy paper files, computer media such as floppy disks, or point to point telecommunication lines. Accountability and audit trail requirements imposed on investigative products are part of the day-to-day business practices of all law enforcement agencies. Additionally, specific federal regulations govern the manner in which intelligence and investigative data will be stored and maintained by all federal and state government data systems. 1 The available technologies for information sharing are endless. But when the requirements for the sharing and retention of law enforcement data are imposed on a national technology solution the field of available candidates is greatly diminished. There are few trusted network systems currently being used on a national level. These systems include; National Crime Information Center (NCIC), VGTOF, Law Enforcement On-Line (LEO) and N-DEx. The Criminal Justice Information Services (CJIS) complex is located within the State of West Virginia. The complex houses a wide range of technologies that serve the FBI and the criminal justice community. The services they provide consist of the automated fingerprint system, gun background check system and secure communications networks for the law enforcement community (Federal Bureau of Investigation, 2008) C.F.R. part 23 establishes the policies surrounding the retention of information within government databases.
6 The pre-established trusted networks housed at the CJIS complex include NCIC, VGTOF, LEO and N-DEx. The NCIC network was established in 1967 and is a computerized index of criminal justice information. The information is available to criminal justice agencies nationwide. The data housed in NCIC assists authorized users to identify stolen property, locate missing persons and apprehend fugitives. All agencies who are authorized subscribers may add pertinent data directly into NCIC, such as warrants, missing persons, and fugitives. Additionally, NCIC is the gateway into the VGTOF database. But users may not enter suspected terrorists for watch list purposes directly into VGTOF. Only the FBI is authorized to do so. Although various data sets are located within NCIC, it is not a database for storing intelligence. The LEO network is an FBI sponsored secure web based platform providing local, state, tribal and federal law enforcement agencies access to an extensive array of law enforcement databases and additional networks. These include; OneDOJ, N-DEx, National Law Enforcement Telecommunications System (NLETS), the Regional Information Sharing Systems Network (RISSNet), which supports law enforcement users in six regional centers, and various Department of Homeland Security (DHS) law enforcement elements. Currently there are in excess of 100,000 LEO account holders. (Federal Bureau of Investigation, National Information Sharing Strategy, 2008). The OneDOJ system is a federation of regional data systems including the FBI, Bureau of Prisons, Drug Enforcement Administration, Bureau of Alcohol, Tobacco and Firearms, and US Marshals. This system is sponsored by the Department of Justice (DOJ). The system provides the user with limited investigative information based on the
7 contributor s discretion. State and local law enforcement agencies are not authorized to contribute data to this system. The RISSNet and NLETS systems service a wide range of law enforcement agencies. Both receive federal funding but are owned and operated by non-federal organizations. State and local law enforcement agencies are permitted to contribute criminal investigative information directly to these systems. Currently there is not a separate tracking data base within either system. The N-DEx system is designed for use by all local, state, tribal and federal law enforcement agencies. The system permits any agency to contribute, receive and share law enforcement information within a collaborative secure environment. The system does have unique functions which would allow for tracking of a specified target crime type. The FBI is the owner and administrator of the N-DEx system. The FBI s Office of General Council (OGC) was consulted with regard to legal liability and civil liberty issues in utilizing the aforementioned systems for tracking of DT adherents. The OGC s concern was databases used for the retention and collection of possible First Amendment protected activity may be problematic. The fact that the aforementioned systems are owned or under the access control of the FBI may expose the FBI to civil liability issues if the data collected, by the contributing agency, was collected outside the policies set forth by the Attorney General (Ptasienski, 2008).
8 Evaluating Technologies The terrorist watchlist process was thoroughly examined by the U.S. Department of Justice in The report looked at the following objectives: (1) DOJ s processes and standards for nominating individuals to the consolidated watchlist are consistent, are articulated in policy or other guidance, and are understood by nominators; (2) DOJ components have quality control processes to help ensure nominations are accurate, understandable, updated with new information, and include all individuals who should be placed on the watchlist based on information available to the agencies; (3) the responsibility for watchlist nominations is clear, effective, and understood; (4) nominators receive adequate training, guidance, or information on the nominations process; (5) DOJ components maintain records of their nominations, including the source of the nomination and what information was provided; and (6) DOJ organizations with terrorism, counterterrorism, and domestic counterterrorism information in their possession, custody, or control appropriately participate in the nominations process (U.S. Department of Justice of Justice Office of the Inspector General, 2008, page 2). The report evaluated the process but not the actual technology used to enable the process; although the process and technology are not mutually exclusive. Therefore, the technologies were evaluated based on their ability to support the aforementioned process. All of the systems were accessible through NCIC or LEO. Both are considered trusted secure networks. The systems available through these networks have individual aspects of functionality but may not support all the objectives identified by the DOJ report. Currently the most logical candidate would be a VGTOF-like database. The following diagram depicts the FBI s watchlist process: FBI Field Division TREX IT Cases DT Cases National Counterterrorism Center Terrorist Screening Center
9 The FBI currently has a detailed process for nominating an individual for placement into VGTOF. The VGTOF placement automatically places the nominee onto the Terrorism Watchlist, which is housed within the Terrorist Screening Center (TSC). During the nomination process the FBI provides a nomination form to the Terrorist Review and Examination Unit (TREX). The TREX Unit is responsible for reviewing and approving the nomination. International Terrorism nominees are forwarded directly to the National Counterterrorism Center. Domestic Terrorism nominees are sent directly to the TSC. Creating a VGTOF-like database would meet many of the DOJ objectives. The objectives which would come into to question in utilizing this model would be an increased burden of creating, reviewing, vetting, and maintaining a separate database by TSC and CJIS. Additionally, the FBI could not ensure the information was gathered in compliance with the Attorney General Guidelines creating potential violations of civil liberties. The technology deployed in support of N-DEx would provide the necessary attributes to address all of the DOJ objectives. Information could be provided directly into the system by local law enforcement. The data to be uploaded would be provided form local data systems which have already been certified as 28 C.F.R. part 23 compliant. The specific data sets would be in keeping with the National Information Exchange Model (NIEM) standard. This would shift the burden of liability of potential violations of civil liberties away from the FBI and back to the contributor. Law enforcement would have the ability to search for specific information and an audit trail would be fully recoverable for each search, for quality control purposes. This process will lessen the burden of review by TREX and federal data entry personnel.
10 # Auto Theft Pickaway, Fairfield, Union, Licking, Time 142 Washburn Seattle Wa Map It Other Addresses J. Blueman Parole Other Phone #s Associates Incident Bank Robbery Jesse Bluefield Arrest Report - Tacoma John Bluefield Arrest Report Seattle Jamie Bluefield Incident - DUI More More Jesse James More Next Auto Thefts January February Implementation Choosing the N-DEx solution for the tracking of local DT adherents would leverage the systems many attributes. Below is a graphic depiction of the process: Data Submitted Information Returned Data 2 Corruption Case XYZ Name: John England SSN: Sharing Attributes Share: OK Do Not Share: Conditional Share Options: Select Subscribe: Next Entity Inquiry James Bluefield 04/15/1968 Recent Address Disposition Entity Relationships Recent Phone Aliases Records Mug Franklin County Crime Characteristics Offense: Forcible Rape Suspect: Male Victim: Race: White Height: 0 to 64 Sex: Female Weight: 0 to 130 ORAge: 55 to 65 Hair: Blonde Find Similar: Subscribe: Next Services Entity Correlation Automated Processing Incident/ Case Correlation Entity Resolution N-DEx Catalog/ Index Capabilities Notification Visualization Search Collaboration Subscription Analytical/ Reporting People, Places, Things, Relationships, Characteristics Entities Contributors to N-DEx would follow the process as outlined bellow: 1. The N-DEx member agency would configure their legacy report/case management information technology system in accordance to the NIEM standard. 2. The contributor would create a report as specified within their department s legacy case management system. The report would have an Information Exchange Package Documentation (IEPD) corresponding to N-DEx.
11 3. The contributor would populate the Criminal Activity Code with the word terrorism. This is a specific IEPD within N-DEx. 4. The contributor would request he/she be notified by the N-DEx network if other N-DEx members queried his/her subject at a later date. 5. Other N-DEx users may query the terrorism Criminal Activity Code to assist them in furthering their investigative or intelligence missions. Conclusion The N-DEx technology will leverage existing trusted networks and extensive user base. Civil Liability issues will be overcome by contributing agencies following their own normal business practices. Providing local, state, and tribal law enforcement with a process for tracking DT adherents will further enhance there ability to connect the dots.
12 References Federal Bureau of Investigation. Criminal Justice Information Services. Retrieved October 15, 2008, from Federal Bureau of Investigation. (2008, August). National Information Sharing Strategy Ptasienski, Drew J. (2008, May). Database for Local and State Entry of Terrorist Information. Federal Bureau of Investigation
NATIONAL INFORMATION SHARING STRATEGY
The Federal Bureau of Investigation NATIONAL INFORMATION SHARING STRATEGY August 2008 August 2008 1 PURPOSE The Federal Bureau of Investigation (FBI) National Information Sharing Strategy (NISS) provides
More informationIAFIS Overview. NGI Development. NGI Capabilities. NGI Implementation. NGI User Support UNCLASSIFIED 2
IAFIS Overview NGI Development NGI Capabilities NGI Implementation NGI User Support UNCLASSIFIED 2 UNCLASSIFIED 3 No national criminal repository prior to 1924 Fingerprints processed manually Integrated
More informationThe Commonwealth of Massachusetts
The Commonwealth of Massachusetts Perpetuating Information Sharing Success: User Reported Successes Guide Planning and Development MassGangs, SWISS Projects IACP's Law Enforcement Information Management
More informationN-DEx Linking Corrections With Law Enforcement
Federal Bureau of Investigation Science and Technology Branch Criminal Justice Information Services Division N-DEx Linking Corrections With Law Enforcement Corrections Technology Association Summit Phoenix,
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationAdvisory Commission on the Administration of Justice April 19, Julie Butler Division Administrator. Dedication, Pride, Service
Advisory Commission on the Administration of Justice Julie Butler Division Administrator Dedication, Pride, Service Statutory Authority Housed within the General Services Division of DPS (NRS 480.130,
More informationNSI. Suspicious Activity Reporting Line Officer Training
Nationwide SAR NSI Initiative Suspicious Activity Reporting Line Officer Training The Suspicious Activity Reporting Line Officer Training CD was developed to assist law enforcement line officers in Understanding
More informationFEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION
FEDERATED IDENTITY AND SHARING CRIMINAL JUSTICE INFORMATION SEARCH MEMBERSHIP MEETING July, 2011St. Louis, Mo. David Gavin Current State of Criminal Justice Information Sharing However beautiful the strategy,
More informationNGI and Rap Back Focus Group Briefing
NGI and Rap Back Focus Group Briefing 2012 SEARCH Annual Membership Group Meeting July 17-19 Brad Truitt Rachel Tucker John Kane 1 Introduction Welcome NGI Update Rap Back Overview/Update Rap Back Focus
More informationINCIDENT-BASED CRIME REPORTING
INCIDENT-BASED CRIME REPORTING NCS-X and NIBRS Program Planning Bureau of Justice Statistics Federal Bureau of Investigation IACP/SEARCH/RTI/IJIS/PERF 1 AGENDA Overview of the NCS-X Program Overview of
More informationCalifornia Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT
California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program
More informationNationwide Suspicious Activity Reporting. Crime Stoppers USA Training Conference New Orleans September 2018
Nationwide Suspicious Activity Reporting Crime Stoppers USA Training Conference New Orleans September 2018 2 NSI Project Partners If You See Something, Say Something Campaign Overview Launched in 2010
More informationHawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011
Hawaii Integrated Justice Information Sharing (HIJIS) SEARCH Annual Meeting July 19, 2011 Presentation Topics Current and Future HIJIS Activities Background HIJIS Strategic Plan HIJIS Architecture Joins
More informationUNCLASSIFIED / FOUO UNCLASSIFIED / FOUO
1 Integrated Automated Fingerprint Identification System (IAFIS) IAFIS has lived up to and vastly exceeded performance expectations Now is the time to design for the future, rather than reacting to it
More informationNC Department of Justice
Information Technology Division (ITD) Presented to: House Appropriations Subcommittee for Information Technology Scott Glawson CIO NC Department of Justice 05/09/2013 ITD Organizational Structure 73 IT
More informationCollaboration Trail - how Corrections information is shared. CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014
Collaboration Trail - how Corrections information is shared CTA 2014 Application and Collaboration Presentation and Q&A June 3, 2014 Agenda Introductions Why Collaborate? Along the Collaboration Trail
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationPrivate Sector Clearance Program (PSCP) Webinar
Private Sector Clearance Program (PSCP) Webinar Critical Infrastructure Protection Committee November 18, 2014 Nathan Mitchell, ESCC Clearance Liaison Agenda History NERC CIPC Private Sector Clearance
More informationTESTIMONY MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE)
TESTIMONY OF MAURITA J. BRYANT, ASSISTANT CHIEF FIRST NATIONAL VICE PRESIDENT NATIONAL ORGANIZATION OF BLACK LAW ENFORCEMENT EXECUTIVES, (NOBLE) BEFORE THE HOUSE JUDICIARY COMMITTEE FEDERAL GOVERNMENT
More informationI I FBI-SC-FPL From: Sent: lleo.gov] arch 24, :55 PM To: I Cc: le.gov. Subject: White House Domestic Policy Request Attachments:
From: Sent: lleo.gov] arch 24, 2011 1:55 PM To: I Cc: le.gov Subject: White House Domestic Policy Request Attachments: NG[ Summary.pdf; IAQ Data Dictionary.pdf; IAQscreenshot.pdf Attached, please find
More informationStatement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationNew York State Integrated Justice Information Exchange Project. NGA GJXDM Policy Academy April 18-20, 2006
New York State Integrated Justice Information Exchange Project NGA GJXDM Policy Academy April 18-20, 2006 NYS Team Representatives at 2006 Policy Academy Name Title Agency Marlaine Hoffman Deputy Director
More informationUNCLASSIFIED. September 24, In October 2007 the President issued his National Strategy for Information Sharing. This
Statement for the Record of The Honorable Michael E. Leiter Director, National Counterterrorism Center on Information Sharing with State, Local, and Tribal Authorities before the House Committee on Homeland
More informationDEPARTMENT OF JUSTICE. [CPCLO Order No ] Privacy Act of 1974; System of Records
This document is scheduled to be published in the Federal Register on 12/04/2017 and available online at https://federalregister.gov/d/2017-25994, and on FDsys.gov Billing Code: 4410-02-P DEPARTMENT OF
More informationBuilding Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust
Building Privacy into Cyber Threat Information Sharing Cyber Security Symposium Securing the Public Trust Jamie Danker Director, Senior Privacy Officer National Protection and Programs Directorate, U.S.
More informationFBI Next Generation Identification (NGI)
FBI Next Generation Identification (NGI) Bigger, Better, Faster NGI - Overview for Strategic Planning July 2013 1 IAFIS Database Criminal History File 75.4 million subjects with over 284+ million arrest
More informationEV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND
EV^CLMH} MEMORANDUM OF UNDERSTANDING BETWEEN THE FEDERAL BUREAU OF INVESTIGATION AND MARYLAND DEPARTMENT OF PUBLIC SAFETY AND CORRECTIONAL SERVICES INFORMATION TECHNOLOGY AND COMMUNICATIONS DIVISION FOR
More informationIACP N-DEx DISCUSSION WITH SEARCH MEMBERSHIP
IACP N-DEx DISCUSSION WITH SEARCH MEMBERSHIP The request of SEARCH membership is to have a discussion regarding N-DEx implementation, especially as related to the role of the states and the effect of the
More informationDepartment of Homeland Security Updates
American Association of State Highway and Transportation Officials Special Committee on Transportation Security and Emergency Management 2016 Critical Infrastructure Committee Joint Annual Meeting Department
More informationUtilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal. Ed Reed Matthew G. Devost Neal Pollard
Utilizing Terrorism Early Warning Groups to Meet the National Preparedness Goal Ed Reed Matthew G. Devost Neal Pollard May 11, 2005 Vision The Terrorism Early Warning Group concept fulfills the intelligence
More informationFACT SHEET SHIFTING FROM PROSECUTION TO PREVENTION, REDESIGNING THE JUSTICE DEPARTMENT TO PREVENT FUTURE ACTS OF TERRORISM
WEDNESDAY, MAY 29, 2002 (202) 514-2008 WWW.USDOJ.GOV TDD (202) 514-1888 FACT SHEET SHIFTING FROM PROSECUTION TO PREVENTION, REDESIGNING THE JUSTICE DEPARTMENT TO PREVENT FUTURE ACTS OF TERRORISM When terrorism
More informationHow Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework
More informationCellular Site Simulator Usage and Privacy
Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationThe National Network of Fusion Center: Where We Have Been and Where We are Going
The National Network of Fusion Center: Where We Have Been and Where We are Going . UNCLASSIFIED//FOR OFFICIAL USE ONLY Purpose of the Brief Evolving Threat Environment Progress Made in Support of the National
More informationNext Generation Identification Rap Back Services
Next Generation Identification Rap Back Services Presented by: Jimmy Mills Management and Program Analyst Rap Back Services Team Theresa Yarboro Management and Program Analyst Rap Back Services Team 1
More informationAUDIT QUESTIONNAIRE. Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit.
AUDIT QUESTIONNAIRE Completion of this questionnaire and all related items prior to the audit will reduce the time needed to complete your audit. ORI Person Completing Date Phone Number AGENCY AGREEMENT
More informationFBI Role in Overseas Investigations
DONALD VAN DUYN CHIEF INTELLIGENCE OFFICER FEDERAL BUREAU OF INVESTIGATION BEFORE THE SENATE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS JANUARY 8, 2009 Good afternoon Chairman Lieberman, Senator
More informationJOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION
JOINING FORCES TO ACHIEVE STATEWIDE N DEx INTEGRATION PRESENTED BY: Leon Frederick, CIO, Iowa Department of Public Safety Liz Pearson, URL Integration PRESENTATION OVERVIEW What is N-DEx? What is Iowa
More informationStatisticians in the Federal Government: Producing Data on the Criminal Justice System
Statisticians in the Federal Government: Producing Data on the Criminal Justice System Washington Statistical Society Gonzaga College High School Washington, DC February 5, 2019 Jeri M. Mulrow Vice President
More informationREDACTED FOR PUBLIC RELEASE. U.S. Department of Justice Office of the Inspector General Audit Division. Audit Report September 2005
THE EXTERNAL EFFECTS OF THE FEDERAL BUREAU OF INVESTIGATION S REPRIORITIZATION EFFORTS U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-37 September 2005 THE EXTERNAL
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationMissouri State Highway Patrol. OCN Query Application. Detailed Requirements Specification Version 1.3
Missouri State Highway Patrol OCN Query Application Detailed Requirements Specification Version 1.3 Table of Contents 1 Document Description... 6 1.1 Intent... 6 1.2 Executive Summary... 6 1.3 Overview...
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationBCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA
BCA MNJIS Resources and Information Sharing Initiatives MCPA CLEO AND COMMAND ACADEMY DECEMBER 4TH, 2014 CAMP RIPLEY, MINNESOTA AGENDA TOPICS Overview of MNJIS Product Managers Role and Purpose Information
More informationInvestigating Insider Threats
Investigating Insider Threats February 9, 2016 Jonathan Gannon, AT&T Brenda Morris, Booz Allen Hamilton Benjamin Powell, WilmerHale 1 Panelist Biographies Jonathan Gannon, AT&T, Executive Director & Senior
More informationNational Policy and Guiding Principles
National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework
More informationTHE WHITE HOUSE. Office of the Press Secretary. EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS
THE WHITE HOUSE Office of the Press Secretary EMBARGOED UNTIL DELIVERY OF THE PRESIDENT'S February 12, 2013 STATE OF THE UNION ADDRESS February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical
More informationNIEM in Action: Roadmap to Successful Standards- Based Information- Sharing
NIEM in Action: Roadmap to Successful Standards- Based Information- Sharing The National Information Exchange Model (NIEM) A Presentation to the IACP-LIEM Conference May 9, 2008 Nashville, TN Paul Wormeli,
More informationSEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES
SEARCH 2007 Annual Meeting July 17-20, 2007 Portland, Oregon BJA AND SEX OFFENDER (SO) ISSUES Dru Sjodin National Sex Offender Public Website Updates to the public website are in development to meet the
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Working Together How Federal Agencies Coordinate Security Across All Disciplines: The
More informationNational Counterterrorism Center
National Counterterrorism Center Vision To become the nation s center of excellence for terrorism and counterterrorism issues, orchestrating and shaping the national and international effort to eliminate
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationJudicial Inquiry System (JIS)
Judicial Inquiry System (JIS) Active Warrant Alert Calendaring System (AWACS) User Manual Office of the State Courts Administrator Created March 5, 2018 Table of Contents ABOUT THIS DOCUMENT... 3 SCOPE...
More informationGAO INFORMATION SHARING ENVIRONMENT
GAO United States Government Accountability Office Report to Congressional Requesters June 2008 INFORMATION SHARING ENVIRONMENT Definition of the Results to Be Achieved in Improving Terrorism-Related Information
More informationTERRORISM LIAISON OFFICER OUTREACH PROGRAM - (TLOOP)
To: Bay Area UASI Approval Authority From: Mike Sena, Director NCRIC/HIDTA Date: January 10, 2019 Re: Item 7: NCRIC Annual Report and Proposed FY19 Allocation Recommendation: Approve $4,454,066 from the
More informationFederal Bureau of Investigation CJIS Division Next Generation Identification
Federal Bureau of Investigation CJIS Division Next Generation Identification Next Generation Identification Program Office NGI Implementation Schedule Increment 0 In Complete Increment 1 Complete Increment
More informationNational Incident-Based Reporting System. Volume 4: Error Message Manual
U.S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Uniform Crime Reporting National Incident-Based Reporting System Volume 4: Error Message Manual
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationWashington Metropolitan Area Transit Authority Board Action/Information Summary
Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 200972 Resolution: Yes No TITLE: MTPD 2014 Part I Crime Report, January - June PRESENTATION
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationLaw Enforcement Online
Law Enforcement Online Facing the Challenges of Katrina By LESLEY G. KOESTNER John Barry Wayne County Sheriff s Office n today s age of terrorism, what does the weaponry of law enforcement look like? IPerhaps,
More informationFBI Criminal History Record Certification Program
FBI Criminal History Record Certification Program P. David Morgan Fingerprint Examiner Instructor Federal Bureau of Investigation Criminal Justice Information Services Division Biometric Services Section
More informationOregon State Police. Information Technology Overview
Oregon State Police Information Technology Overview Presented by: Tom M. Worthy, Major Presentation date: March 30, 2017 OSP I.T. Mission and Strategy Modernize Standardize Engage & Enable Innovate Workflow
More informationAppendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014
Appendix 3: Subscribing Entity Reference Guide to NGI s Rap Back Service Version 2.1 June 1, 2014 Note to Submitters: The information in this document is provided for you to use in any manner most appropriate
More informationLouisiana - State Analytical & Fusion Exchange (LA-SAFE)
Louisiana - State Analytical & Fusion Exchange (LA-SAFE) Mission Statement The Louisiana State Analytical and Fusion Exchange (LA-SAFE) promotes collaboration in an all-crimes/all-hazards environment,
More informationGENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND
GENERAL ORDER DISTRICT OF COLUMBIA Subject Teletype Unit Messages, Notifications, and Inquiries Topic Series Number SPT 302 04 Effective Date April 21, 2015 Replaces: GO-SP-302.04 (Transmitting of Telecommunications
More informationCRIME ANALYSIS SACRAMENTO COUNTY SHERIFF S DEPARTMENT
27 February 2018 Five Year Uniform Crime Reporting (UCR) Analysis 2013-2017 Page 1 16 SACRAMENTO COUNTY UNIFORM CRIME REPORT 2013-2017 This report provides a five-year analysis of crime trends within the
More informationRecommendation 20.1 & Manager Gordon Brussow ID Unit Forensic Division
Recommendation 20.1 & 20.3 Manager Gordon Brussow ID Unit Forensic Division 20.1 The SFPD needs to develop reliable electronic in-custody arrest data. It needs to ensure that these arrest data accurately
More information-Eight types of cyber data, (Sec. 708(7))
WHAT INFORMATION MAY BE SHARED H.R. 624, the Cyber Intelligence sharing and Protection Act of 2013 (CISPA) (Rogers- -Notwithstanding any provision of law, S. 3414, the Cybersecurity Act of 2012 (Lieberman-Collins-
More informationINTERPOL Washington U.S. National Central Bureau U.S. Department of Justice. Domestic Focus International Reach
INTERPOL Washington U.S. National Central Bureau U.S. Department of Justice The Myth The Reality Worldwide police communications Criminal investigative resources International police databases Arabic,
More informationPasco Police Department Policy Manual. CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40. Effective Date: 04/01/2018. Reference:
CRIME ANALYSIS AND INTELLIGENCE Chapter No. 40 Effective Date: 04/01/2018 Reference: 40.1.1 Crime and Intelligence Analysis Procedures Crime and intelligence analysis is a law enforcement agency function
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationNATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium
NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium Securing Cyber Space & America s Cyber Assets: Threats, Strategies & Opportunities September 10, 2009, Crystal Gateway Marriott, Arlington,
More informationUnion Bank s NMLS REGISTRATION GUIDE. PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO)
Union Bank s NMLS REGISTRATION GUIDE PREVIOUSLY REGISTERED Mortgage Loan Originator (MLO) Revised 4/17/2012 Table of Contents 1.0 S.A.F.E. ACT... 3 1.1 Background... 3 1.2 Registration Overview for s...
More informationOregon Department of Justice
Oregon Department of Justice Created in response to the 9/11 Commission Report Currently 78 Fusion Centers in the US Fusion Centers are unique in design, but the operation mission is the same nationally
More informationNATIONAL STRATEGY FOR INFORMATION SHARING. Successes and Challenges In Improving Terrorism-Related Information Sharing
NATIONAL STRATEGY FOR INFORMATION SHARING Successes and Challenges In Improving Terrorism-Related Information Sharing october 2007 NATIONAL STRATEGY FOR INFORMATION SHARING Successes and Challenges In
More informationResolution: Advancing the National Preparedness for Cyber Security
Government Resolution No. 2444 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing the National Preparedness for Cyber Security It is hereby resolved: Further to Government
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationOffice of Inspector General Office of Professional Practice Services
Office of Inspector General Office of Professional Practice Services Executive Summary In accordance with the Department of Education s fiscal year 2017-18 audit plan, the Office of Inspector General (OIG)
More informationDARPA s Information Awareness Office (IAO) and Total Information Awareness (TIA) Program. Frequently Asked Questions
Question 1: What is the Total Information Awareness (TIA) program? Answer: TIA is a Defense Advanced Research Projects Agency (DARPA) research effort to create a prototype network that integrates innovative
More informationGenesis 1. He did not give Man dominion over Man
Genesis 1 In the beginning God created the heavens and the earth. God said, Let there be light,, and there was light. On the sixth day God created Man and gave Man dominion over the earth. He did not give
More informationGovernment Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security
Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:
More informationKansas ecitation Submission Service Service Description Document
Kansas ecitation Submission Service Service Description Document v 1.0.0 July 15, 2011 Page 1 Table of Contents Document Introduction... 4 ECitation Data Submission Service Overview... 6 Purpose... 6 Scope...
More informationELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING
ELECTRIC UTILITY SECTOR PHYSICAL THREATS (DBT) & RESPONSE PLANNING Helping to keep the lights on, businesses running and communities strong 1 Objectives The Utility Business has Changed Methodology Program
More informationTIME System Newsletter Volume February 2016
Wisconsin Department of Justice Division of Law Enforcement Services Brad D. Schimel Attorney General TIME System Newsletter Volume 2016-1 February 2016 The TIME System processed 53,556,473 transaction
More informationEmergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:
ESF Coordinator: Homeland Security/National Protection and Programs/Cybersecurity and Communications Primary Agencies: Homeland Security/National Protection and Programs/Cybersecurity and Communications
More informationSLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004
SLED Certification of 3 rd Party NCIC/SCIC Applications Overview February 2, 2004 This document provides an overview of the program put into place by the South Carolina Law Enforcement Division (SLED)
More informationNationwide Suspicious Activity Reporting (SAR) Initiative (NSI)
Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Nationwide SAR Initiative (NSI) Responds directly to the Intelligence Reform and Terrorism Prevention Act of 2004 and to the direction of
More informationCritical Infrastructure Protection and Suspicious Activity Reporting. Texas Department of Public Safety Intelligence & Counterterrorism Division
Critical Infrastructure Protection and Suspicious Activity Reporting Texas Department of Public Safety Intelligence & Counterterrorism Division GOAL: Prevent terrorist attacks in Texas and prevent criminal
More informationCJIS Advisory Policy Board. Disposition Task Force. SEARCH 2011 Winter Membership Meeting
CJIS Advisory Policy Board Disposition Task Force 1 History The APB discussed the issue of incomplete records and the need to include courts in future discussions The APB recommended the formation of a
More informationBiometric Center of Excellence (BCOE)
Federal Bureau of Investigation Science & Technology Branch Criminal Justice Information Services Division Biometric Center of Excellence (BCOE) International Association for Identification 100 Year -
More informationMarijuana Establishment Agent Card Application and Checklist
Marijuana Establishment Agent Card Application and Checklist State of Nevada Department of Taxation For use by Marijuana Establishments Owners, Officers, Board Members, Employees, Volunteers, and Contractors
More informationSummary of WISE Needs Assessment Project
Summary of WISE Needs Assessment Project Prepared by ASU s Center for Violence Prevention and Community Safety August 17, 2006 What is the ASU Center for Violence Prevention and Community Safety? An organizational
More informationG7 Bar Associations and Councils
COUNTRY PAPER UNITED STATES G7 Bar Associations and Councils SEPTEMBER 14, 2017 ROME, ITALY The American Bar Association P R E F A C E As we have witnessed, cyber terrorism is an extremely serious threat
More informationGreg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security
1 Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security 2 Government Services 3 Business Education Social CYBERSPACE
More informationTHE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER
THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority
More informationThe Global Justice Information Network:
The Global Justice Information Network: An Introductory Report on Infrastructure Issued by: Infrastructure/Standards Working Group Global Justice Information Network Advisory Committee June 2000 Message
More informationGAO. Testimony Before the Committee on Homeland Security and Governmental Affairs, U.S. Senate
GAO For Release on Delivery Expected at 10:00 a.m. EDT Wednesday, July 23, 2008 United States Government Accountability Office Testimony Before the Committee on Homeland Security and Governmental Affairs,
More information