The CommSys - ConnectCIC TM "Transaction Package Review" This event is open to CommSys partners interested in integrating their applications for entry.

Slides:



Advertisements
Similar presentations
RP Designs Semi-Custom e-Commerce Package. Overview RP Designs semi- custom e-commerce package is a complete website solution. Visitors can browse a catalog.
Advertisements

LEADS Law Enforcement Agencies Data System
Integrated Justice Models Integrated Justice Models.
Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
Service Manager for MSPs
Indianapolis, Indiana Offender Notification Meetings.
NMLETS Replacement Project. C2 funding - Laws of 2007, Chapter 28, Section 7, Item 030 Project Initiation Certification ($200,000) – 10/2007 Consultant.
Easy to use Ability to attach policies/procedures to call types Ability to schedule calls in advance Officer safety alerts Robust search capabilities.
Discussing Preparation for "ASAP to PSAP" CommSys is presenting information to our ConnectCIC Partners on ASAP Alarm Information Exchange Service.
NATIONAL CONFERENCE ON PRIVACY, TECHNOLOGY AND CRIMINAL JUSTICE INFORMATION THE ROLE OF LAW ENFORCEMENT AND STATE CRIMINAL HISTORY REPOSITORIES Washington,
Discussing Batch Interface for ConnectCIC TM CommSys Inc is presenting information to our ConnectCIC TM Partners on the Batch Interface offered as an additional.
Database Woes Plague Homeland Security and Law Enforcement.
Paperless Online Payroll, Integrated HR & Report Generating System.
1 Regional Justice Information Sharing National Governors Association New Orleans, Louisiana August 7, 2003 Steve Correll, Executive Director NLETS.
© CommSys, Inc. ~ May 2012 Discussing Preparation for "ASAP to PSAP" CommSys is presenting information to our ConnectCIC Partners on ASAP Alarm Information.
Nlets – The International Justice and Public Safety Information Sharing Network.
INFORMATION SYSTEMS DOJ/CLETS/CORI/DMV.
Maryland’s Security Integration Initiative Sometimes the most common sense solutions drive success Virginia Geckler Ron Brothers.
Governor’s Commission on Volunteerism & Community Service volunteerflorida.org AmeriCorps Background Check101  NATIONAL SERVICE CRIMINAL HISTORY CHECK.
Arizona Criminal Justice Information System
Technical Architectures
S.R.F.E.R.S. State, Regional, and Federal Enterprise Retrieval System Inter-Agency & Inter-State Integration Using GJXML.
1 Classification: Genpact Internal.  Tool From Oracle  Works with Oracle Database  PL/SQL Based  Widely Used with Oracle Applications  Can be Used.
W2 – WASIS and WACIC WASIS – Criminal History Repository
BUSINESS DRIVEN TECHNOLOGY
Configuration Management
Passage Three Introduction to Microsoft SQL Server 2000.
ClubRunner Connect. Communicate. Collaborate. ClubRunner and Rotary International Database Integration Introduction and Overview Introduced: November 2010.
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
THE HEART OF LIFE ON THE BEAT THE HEART OF LIFE ON THE BEAT Roger W. Ham Chief Information Officer Commanding Officer Los Angeles Police Department Roger.
NCJIS Modernization Program
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Nine Police Technology External Systems.
Driving While Impaired
GEORGIA ELECTRONIC CONVICTION PROCESSING SYSTEM 1 Georgia Electronic Conviction Processing System (GECPS)
Data Integration Problem How to access data across 22 different data systems, most operating on different hardware, using different software, and having.
Iowa’s Impaired Driving Records Demonstration Project Traffic Records Forum July 16, 2003 Mary Jensen Iowa Department of Transportation Traffic Records.
MSF Requirements Envisioning Phase Planning Phase.
Functions of a Database Management System
CS 390- Unix Programming Environment CS 390 Unix Programming Environment Topics to be covered: Distributed Computing Fundamentals.
Learningcomputer.com SQL Server 2008 – Administration, Maintenance and Job Automation.
Computer Emergency Notification System (CENS)
Storing Organizational Information - Databases
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
CHAPTER 3 DATABASES AND DATA WAREHOUSES. 2 OPENING CASE STUDY Chrysler Spins a Competitive Advantage with Supply Chain Management Software Chapter 2 –
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
IS 325 Notes for Wednesday August 28, Data is the Core of the Enterprise.
Page 1 © 2001, Epicentric - All Rights Reserved Epicentric Modular Web Services Alan Kropp Web Services Architect WSRP Technical Committee – March 18,
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
U.S. Government License Plates The new…. 1. Circle of Life for License Plates 1: Manufacture & Shipment 2: Received at Agency 3: Use (Attached to a Vehicle)
1 The New York State Integrated Justice Information Exchange Project BJA Regional Information Sharing Conference: Information Exchange Modeling/Business.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Search Overview Search Features: WSS and Office Search Architecture Content Sources and.
Jini Architecture Introduction System Overview An Example.
SEARCH SEARCH, The National Consortium for Justice Information and Statistics
Copyright (c) 2014 Pearson Education, Inc. Introduction to DBMS.
NCIC VALIDATION PROCESS. Control, Validation, and Other Procedures  Agencies that enter records in NCIC are responsible for their accuracy, timeliness,
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Bridging the gap between collision data collection and reporting Presented by Jeff Holt, President Holt, Sheets & Associates.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
Brady Act Requirements In November 1993, the Brady Handgun Violence Prevention Act of 1993 (Brady Act), Public Law , was signed into law requiring.
Software Project Configuration Management
Project Management: Messages
Presented By: Scott Dickman
Best Practices for Dynamics NAV Administration and Security
INTERPOL Washington Forty years of connecting police worldwide
RELATIONAL DATABASE MODEL
Ch > 28.4.
What’s changed in the Shibboleth 1.2 Origin
CJIS-Central Repository
Introduction of Week 11 Return assignment 9-1 Collect assignment 10-1
IFTA CLEARINGHOUSE DEMOGRAPHICS
Presentation transcript:

The CommSys - ConnectCIC TM "Transaction Package Review" This event is open to CommSys partners interested in integrating their applications for entry and modification to state, regional and national CJIS systems.

Introductions Our goal is to define the transaction packages that make up the ConnectCIC TM additional standardized transaction capability Presenter: Bob Turner – President at CommSys, Inc Coordinator: Kelli Adkins – Marketing Director at CommSys, Inc

Transaction Packages This presentation serves to detail and clarify the capabilities and functions of Additional Transaction Packages for purposes of information and contractual performance

Agenda Discuss ConnectCIC TM –Transactions vs. Transports vs. Options Discuss the CJIS Systems –State and National Levels Review the Transaction Packages –As options to purchase for ConnectCIC TM Closing with Questions and Answers

Why do this presentation? Most CommSys partners know ConnectCIC TM from its basic configuration What may be less clear is what are the Transaction Packages for ConnectCIC TM

Transaction Packages Transaction Packages allow additional functionality to software communicating with the state/ national CJIS systems This adds value to our partners customers by offering more functionality

History When we architected ConnectCIC TM, there was a we understood the requirements for the product because of the previous years of experience CommSys held in supporting the CJIS interfaces in more than 45 states. We leveraged the speed and integrity of well written C++ code to ensure we had a high performance and reliable communication environment.

Understanding ConnectCIC TM

CommSys primarily looks at the CJIS interfacing for ConnectCIC TM from two aspects CJIS Criminal Justice Information System

The Two Aspects Transports Transactions

Transports CommSys codes transports for every state/regional system we connect with.

As of Today This number is in excess of fifty different transports that ConnectCIC TM understands. The good thing is transports dont change very often.

Transactions or often referred in legacy terms to as formats or even masks. The transaction is what the partner invokes to take a standardized API message and have ConnectCIC TM transform it into a state message switch transaction. The term formats was the old term used to describe the layout of a teletype message. More correctly now the term that is used is transactions.

The Difference Transports: are consistent Transactions: are changing all the time Certainly the core Drivers Licenses and Vehicle Registration lookups do not change a lot. However, with new transactions, and modifications to existing, we get a lot of changes over time. ConnectCIC TM generates one or more messages to the connected CJIS systems.

Requirements The two main requirements were: –Transports needed to be fast and reliable –Transactions needed to be flexible and easy to change The requirement steered us to implement the transports in C++. These two requirements drove most of the architecture decisions for ConnectCIC TM.

Flexibility The ability to quickly update transactions in the engine without the need to deploy a new executable to the site. A pseudo-code or p-code engine is essentially an interpreter of a defined language. The Java environment is a p-code engine. CommSys developed a p-code engine in ConnectCIC TM for processing and formatting CJIS transactions and messages.

Transaction Store This is part of the SQL database that is required for the software to run. Each transaction action is modular in that a drivers license check transaction can be properly updated in the transaction store without affecting any other transaction. The architecture is extensible to allow new transactions and functionality in regards to message processing to be added without the ConnectCIC TM engine being shutdown. This capability is one of the greatest strengths of ConnectCIC TM and the foundation that we use to offer addition transactions and functionality to our partners. The transactions for the p-code engine are stored in the ConnectCIC TM transaction store

Options vs. Transactions There may be a bit of confusion understanding ConnectCIC TM Options vs. Transaction Packages –Options pertain to the functionality of the ConnectCIC TM Engine i.e. multi-server connections –Transactions pertain to the messages that can transmit to a particular state Messages are segmented along functional lines

What does ConnectCIC TM comes with? Transport –A transport is the code that is used to move messages to and from an end-point. This is classically the state-side connection to a ConnectCIC TM instance. Basic Inquiry –Basic Inquiry has been designed to support the typical mobile data, and basic needs of both computer aided dispatch (CAD) and law enforcement records management systems (RMS).

Basic Inquiry Terminology 1.People – wanted (state and NCIC), operator license 2.Vehicles – stolen (state and NCIC), registration 3.Gun – stolen 4.Article – stolen 5.Boat – stolen and registration The Exception: State specific – snowmobile inquiries, state minimum group (NC, SC, MS) 5 Common Transaction Groups

Drivers License Query In each group we do not provide every transaction. Instead we provide the most frequently run. For example, for persons check we provide a macro transaction Drivers License Query transaction which checks three things: –State drivers license information –NCIC Wanted person by name –If available, state wanted persons by name CommSys provides each group one or two transactions and can be called with different parameters, such as for a vehicle check by License Plate or VIN.

Basic Inquiry (BI) We include BI as part of ConnectCIC TM because or our history –We started doing CJIS interfaces for mobile and CAD systems in the early 1990s BI is the embodiment of the 80/20 rule Why is BI so important?

Identification A fundamental component of Law Enforcement activity is the ability to perform identification of persons and property This occurs in several ways –Verification of the publics identity when making contact with Law Enforcement –Looking up a registered owner of a vehicle –Verifying fingerprints when arresting an individual

Why do users want other Transactions? Workflow! They dont want to switch back and forth between applications –They want you to integrate more functions between your application and the state CJIS system

CJIS Systems Background

What do the CJIS systems do? To understand the overall function it requires that you understand the role of the systems that make up the CJIS networks CJIS Criminal Justice Information System

History The CJIS networks are some of the oldest information sharing networks in the country –Dating back to the 1930s in the Northeast The burden of being one of the largest and prolific environments has been heavy –Some of the technology relates directly back to the teletypes used up until the 1980s

CJIS Networks History The need for additional transaction means having a good understanding of the operational environment of the users. The diagram is logical in the details of describing the typical environment most end users see, directly or indirectly.

State Message Switch State managed switch –Typically by a state Criminal Justice Agency State Police or Patrol Dept. of Public Safety Dept. of Justice –Interfaces with DMV Hot Files (Warrants and Wants) Criminal History NCIC and NLETS

NCIC The National Crime Information Center (NCIC) is the United States' central database for tracking crime-related information. –Since 1967, the NCIC has been maintained by the Federal Bureau of Investigation's Criminal Justice Information Services Division Located in Clarksburg, WV –Data is received from federal, state and local law enforcement agencies, as well as tribal law enforcement agencies.

What does NCIC stores: Person records: –Persons with active arrest warrants –Missing persons –Persons with active protection orders –Violent gang organizations and membership –Terrorist organizations and membership –Secret Service protective alerts –Unidentified human remains information –Convicted Sex Offenders –Foreign Fugitives –Immigration violators –Parolees or people on Supervised Release

More of what NCIC stores: Property records –Firearms records, including lost or missing firearms –Stolen vehicles and boats –Stolen vehicle and boat parts –Stolen property –Stolen, embezzled or counterfeit securities

Nlets Nlets provides electronic messaging to allow information exchange between state, local, and federal agencies + support services to justice-related computer programs. –The network is operated by Nlets - a non-profit corporation (501c3) owned and operation by the states and funded solely by fees for service. –The federal and international components operate very similarly. Users include all U.S. states and territories, Federal agencies with a justice mission, and certain international agencies. –Information exchange is voluntary and includes everything from motor vehicle registrations, driver's data, Interpol warrants, Canadian 'Hot File' records, and INS databases to state criminal history records. –The primary operational site for the network is housed in Arizona, with a secure backup site located in Kentucky. used to be known as National Law Enforcement Telecommunications System now they just call themselves Nlets

NCIC vs. Nlets NCIC is a Hot File database system –It has information relative to people, vehicles and items involved in felony crimes Nlets is a network of state and national Message Switches and some database

Understanding Transactions

Integrated Interfaces This is what our partners deliver to our customers using ConnectCIC TM –This activity is primarily inquiry based However customers need better integration with transaction groups beyond inquiry –What are they?

Entry/Modify Transactions Entry – Entering the record into the file or database Modify – Modifying existing record in the database Locate – An official notification from agency to agency Clear – Officially clearing the record Cancel – Remove a record that should not have been entered

Breaking Them Down Entry/Modify are what you would expect –They add or update data stored in databases (or files) Locate is a way to send an official notification from a finding agency to the entering agency Clear and Cancel remove information from the databases –However Clear retains disposition information on what happened

How CommSys Packages Transactions

Packages vs. Expanded Query/Entry Traditionally when partners have needed additional transactions we have done them on a pay-per- transaction basis –Expanded Query/Entry requests are handled on a custom quote basis –Additional Transaction Packages are priced according to the price list They are on the new price list which will be released at the end of the year

ConnectCIC TM Transaction Packages We provide these transaction groups under the caption of Additional Transaction Packages. Per transaction pricing was creating new problems –It was a challenge for both CommSys and our Partners to figure out what was needed –We identified the transactions receiving the most requests and packaged them in logical groups Packages are not limited to inquiry only and may also involve record entry, modification or deletion

The Six Transaction Packages - Computerized Criminal History Inquiry (CCH) - Basic Entry (BEP) - Wanted Missing Persons Inquiry (WMP-I) - Wanted Missing Persons Entry/Modify (WMP-E) - Administrative and Operations Support (AOS) - Canadian Basic Inquiry via Nlets (CPIC-BI) with multiple transactions in each group

Other Transaction There are other transactions that are not traditional database messages - such as: –Sending messages between agencies or –Looking up agency contact information CJIS Criminal Justice Information System These other types of messages are a minority but they do exist and are discussed later in the document.

Alternative to Entry Packages Considering cost effective offerings: CommSys offers the CLIPS TM software product as a full function terminal CLIPS TM offers more advanced integration with our partners Records Management Software (RMS)

Why not implement all transactions for a state? Could be done - but it is a lot of work and maintenance Or you could use CLIPS TM –CLIPS TM can be integration in to your application using ConnectCIC TM … that is for another Webinar - ;)

Detailed Transactions Group Discussion

Entry/Modify Transactions The Basic Entry Package is a parallel to our standard Basic Inquiry Transaction Package. With Basic Inquiry there are five main groups of transactions: –persons, vehicles, guns, boats and articles BEP Basic Entry Package

Administration and Operations Administrative Message (Teletype message - Agency to Agency) Hit Confirmation (Hit Request message or Hit Response message) ORI Look-up (provides look-up ORI agency addresses) Hazmat ( Specialized look-up of Hazardous Materials by UN number) FAA Aircraft Registration Look-up (using either the aircraft registration/tail number or aircraft serial number) AOS Administration and Operations Support Package Typical 5 Admin/Ops Transactions:

Computerized Criminal History The CCH transactions are searches for Criminal History (Rap Sheet) information maintained by the FBI or individual state. –Interstate Identification Index (Often referred to as Triple I records) –In-state Criminal Histories (depending on severity of the crime) Criminal History is not an updatable file, therefore there is no entry option. CCH Computerized Criminal History Inquiry Package

Wanted/Missing/Unidentified Person Inquiry Missing/Unidentified Person Supervised Release Parole/Probation Sex Offender Order of Protection WMPI Wanted/Missing/Unidentified Person Inquiry Package Typical 5 WMPI Transactions:

Wanted/Missing/Unidentified Person Entry Similar to Basic Entry as a parallel to Basic Inquiry, WMPE is the parallel to WMPI. Provides the entry, modify, clear, cancel and support transactions that are relevant for this subset. WMPE Wanted/Missing/Unidentified Person Entry Package

Canadian Basic Inquiry Package Canada in similar methods to U.S. CJIS systems in maintaining databases of wants and warrants, or material items which have been stolen or gone missing. Essentially the same databases can be found in the Canadian Police Information Centre (CPIC) and the provincial systems. CPIC The Canadian Police Information Centre Inquiries As is the case in the U.S. in Canada the systems are split between provinces and national databases. ~persons, vehicles, guns, boats and articles~

Expectations … These are not flip the switch offerings …

Transaction Group Availability CommSys delivers transaction groups based on demand, and not all state systems are currently defined. CommSys will deliver an additional transaction group within sixty days after receipt of an order (ARO). Some states preclude some transaction types: Example – in Ohio we cannot deliver entry or modify transactions as it is not supported from integrated interface connections without special permission.

Thank You Presenter: Bob Turner – President at CommSys, Inc Coordinator: Kelli Adkins – Marketing Director at CommSys, Inc

Questions/Answers NOTE: Additional documents with information are available at the CommSys.com Support link and website