1 Law Enforcement National Data Exchange July 2007 Industry Briefing & IJIS Committee Meetings 07/27-28/2007.

Slides:



Advertisements
Similar presentations
LEADS Law Enforcement Agencies Data System
Advertisements

Illinois Justice Network Portal Implementation Board Meeting February 11, 2004.
1 Law Enforcement National Data Exchange SEARCH Annual Membership Group Meeting July 20, 2007.
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
NATIONAL CONFERENCE ON PRIVACY, TECHNOLOGY AND CRIMINAL JUSTICE INFORMATION THE ROLE OF LAW ENFORCEMENT AND STATE CRIMINAL HISTORY REPOSITORIES Washington,
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
Vision 2015 Justice Information-Sharing in California.
CrimeLink Explorer: Lt. Jennifer Schroeder Tucson Police Department Jie Xu University of Arizona June 2, 2003 Using Domain Knowledge to Facilitate Automated.
Transformations at GPO: An Update on the Government Printing Office's Future Digital System George Barnum Coalition for Networked Information December.
Systematic Review Data Repository (SRDR™) The Systematic Review Data Repository (SRDR™) was developed by the Tufts Evidence-based Practice Center (EPC),
Arizona Criminal Justice Information System
Europol’s tailor-made data protection framework
Graduate System for Management of Admissions, Alumni & Records Tracking (Grad SMAART) January 8, 2007 Office of Graduate Studies.
16 months…. The Visibility Information Exchange Web System is a database system and set of online tools originally designed to support the Regional Haze.
Centers for IBM e-Business Innovation :: Chicago © 2005 IBM Corporation IBM Project October 2005.
1 Components of A Successful Data Warehouse Chris Wheaton, Co-Founder, Client Advocate.
1 Data Strategy Overview Keith Wilson Session 15.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
THE HEART OF LIFE ON THE BEAT THE HEART OF LIFE ON THE BEAT Roger W. Ham Chief Information Officer Commanding Officer Los Angeles Police Department Roger.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 August 15th, 2012 BP & IA Team.
U.S. ENVIRONMENTAL PROTECTION AGENCY Reusable Component Services RCS Update Presentation to Enterprise Architecture Team 09/11/2012 John Harman,
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
National Governor’s Association September 29-30, 2003 Salt Lake City, Utah.
TDEx and N-DEx Connecting Criminal Justice Agencies across Texas and the Nation TCJIUG Austin, May 2006.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Wisconsin Digital Summit Monona Terrace November 15, 2004 Justice and Public Safety Interoperability: Wisconsin’s Justice Information Sharing (WIJIS) Initiative.
Database Design - Lecture 1
9/11/ SUPPORT THE WARFIGHTER DoD CIO 1 Sample Template Community of Interest (COI) Steering Committee Kick-off Date: POC: V1.0.
1 Law Enforcement National Data Exchange SEARCH Conference January 22-25, 2008.
FEED ME, SEYMOUR! LITTLE SHOP OF HORRORS (1986) DR. JOE CICCONE Criminal Justice Information Systems and Case Management Systems.
1 Program Update/Timeline November,  Statement of Requirements (ConOps)  Funding Projections  DOJ/BJA  Cost Modeling  Effectively Communicate.
SAML, XACML & the Terrorism Information Sharing Environment “Interoperable Trust Networks” XML Community of Practice February 16, 2005 Martin Smith Program.
Doug Bellomo April 6, NFDA Retreat & Conference “Risk MAP--Foundation, Transition, Integration” Risk MAP: An Update to NFDA.
1 Law Enforcement National Data Exchange An Overview of the N-DEx Program IEPD Development September, 2006.
© 2008 IBM Corporation ® Atlas for Lotus Connections Unlock the power of your social network! Customer Overview Presentation An IBM Software Services for.
Relationships July 9, Producers and Consumers SERI - Relationships Session 1.
UNCLASSIFIED Submitting NIBRS via N-DEx May /12/20151 William F. See NIBRS Coordinator FBI UCR Program CJIS Division
© 2008 IBM Corporation ® IBM Cognos Business Viewpoint Miguel Garcia - Solutions Architect.
National Information Exchange Model Presented by : Mini Kanwal June, 09.
GRA Implementations using Open Source Technologies Mark Perbix and Yogesh Chawla SEARCH.
BJA SAVIN Guidelines & Standards Purpose of the SAVIN Guidelines How the Guidelines were developed Review of the Guidelines and Standards.
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
1 Vendor Conference N-DEx Overview June 20, 2007 J. Kevin Reid
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
Information Exchange Modeling and Business Process Mapping California Department of Justice Bureau of Criminal Identification and Information.
NMI End-to-End Diagnostic Advisory Group BoF Fall 2003 Internet2 Member Meeting.
1 The New York State Integrated Justice Information Exchange Project BJA Regional Information Sharing Conference: Information Exchange Modeling/Business.
National Information Exchange Model (NIEM) Executive Introduction November 29, 2006 Thomas O’Reilly NIEM Program Management Office.
JIEM and Business Process Change. 2 Objectives Need for Exchange Analysis – Available Tools What is JIEM? Business Process Modeling Using JIEM Where JIEM.
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
1 Program Update/Timeline BJA Regional Information Sharing Conference - November
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Law Enforcement National Data Exchange An Overview of the N-DEx Program Document Date: May 2,2006.
U.S. Department of Justice Law Enforcement Information Sharing Program (LEISP) Spring 06 - Global Advisory Committee (GAC) Meeting Vance Hitch, Chief Information.
Implementing the FEA DRM Michael C. Daconta Metadata Program Manager March 15, 2004.
The Claromentis Digital Workplace An Introduction
June 20, 2007 Sensitive But Unclassified 1 Team Raytheon Presentation 1:00 – 3:00 p.m.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
11 Welcome to the JISP Beacon Webinar: Connect South Dakota: A Justice Information Sharing Success Story Your phone will be muted upon entry. This session.
International Planetary Data Alliance Registry Project Update September 16, 2011.
IPDA Registry Definitions Project Dan Crichton Pedro Osuna Alain Sarkissian.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Ian Bird GDB Meeting CERN 9 September 2003
National Data Exchange BJA Regional Information Sharing Conference
IDN Variant TLDs Program Update
INTERPOL Washington Forty years of connecting police worldwide
Tennessee Longitudinal Data system (TLDS)
Tennessee Longitudinal Data system (TLDS)
Concept of Operations Development Status, Capabilities and Scenarios
Presentation transcript:

1 Law Enforcement National Data Exchange July 2007 Industry Briefing & IJIS Committee Meetings 07/27-28/2007

2 Raytheon’s Role in the Project Awarded the contract, February 2007 by FBI-CJIS to develop and implement N-DEx system Technological design and requirements were guided by the Concept of Operations (CONOPS). CONOPS was developed by FBI-CJIS in collaboration with LEA subject matter experts, national law enforcement associations, and the CJIS Advisory Policy Board Long term goals for the N-DEx project: Provide a powerful new investigative tool to search, link, analyze data for disparate local, state, tribal, and federal systems for the exchange of information Provide a one-stop-shop capability

3 Increment 1

4 Increment 1 (Cont.) Objective Introduce a national information sharing service with up to 5 years of correlated incident reports Features Search, sort and filter results Resolve and correlate entities and cases (People, Vehicles, Locations, Reports) Visualize incident relationships and timelines Analytical/Reporting using pre-defined reports On-line training Security and data privacy controls Agency toolkit (to facilitate Increment 2 agency integration)

5 Leveraged Systems NCIC / III One DOJ CJIS Services ESAN for storage SIT for data backup NCIC/N-DEx Web Services Interface (To include QW, QG, QA, and QV ) LEO for user identification, collaboration through existing LEO services Users 50,000 Users Emphasize detectives, analysts, and investigators Data Incident / Case Reports Risk Reduction Prototypes Raytheon Usability prototype for search and visualization Raytheon Technology prototype for search and correlation scalability and accuracy Increment 1 (Cont.)

6 N-DEx Data Sensitivity Levels The entering agency categorizes data submitted to the System into levels of sensitivity upon which the dissemination of the information/data is controlled. APB Approved Sensitivity Levels: - This capability will allow agencies to submit information for sharing but control the dissemination of sensitive information to protect investigative equities. - Sensitivity applied to specific data elements if needed LEVEL 1 - SHARED N-DEx shall provide the capability for data contributors to allow sharing data it submits to N-DEx LEVEL 2 – CONDITIONALLY SHARED N-DEx shall provide the capability for data contributors to specify “pointer based” sharing of data. (i.e. provide POC information only) LEVEL 3 – NOT SHARED N-DEx shall provide the capability for data contributors to restrict data its submits to N-DEx. This level is reserved for the most restricted investigations and investigative information.

7 Granularity of Sharing Policy Sharing policy can apply to entire records specific elements/attributes within the record, or groups of elements/attributes If data received pre-tagged, sharing policy must apply to entire record (#’s 1-3 in example)

8 Sharing Rules, Increment 1 1 If incident type is SEX CRIME and person is type VICTIM, personal identifying data is restricted, except for > 2 If person is of type WITNESS and person attribute AGE IS LESS THAN 18 AT TIME OF EVENT, personal identifying data is restricted, except for > 3 If person is of type SUBJECT and person attribute AGE IS LESS THAN 18 AT TIME OF EVENT, personal identifying data is restricted, except for > 4 If person is of type VICTIM and person attribute AGE IS LESS THAN 18 AT TIME OF EVENT, personal identifying data is restricted, except for > 5 All Incidents are pointer-based accessed, except for > Note: “personal identifying data” is Name, SSN, Age, and Address In Increment 1, contributors can select rules from a pre-defined list Candidate rules include:

9 N-DEx will be required to query NCIC via NCIC transactions such as the QW, QG, QA, and QV transaction. N-DEx will search 16 of the 21 NCIC files, to include Interstate Identification Index (III) search. N-DEx / NCIC Integration  Originating Agency Identifier  Wanted Person  Missing Person  Foreign Fugitive  U.S. Secret Service Protective  Vehicle  License Plate  Boat  Vehicle/Boat Part  Article  Gun  Violent Gang and Terrorist Organization  Convicted Person on Supervised Release  Convicted Sexual Offender Registry  Identity Theft  Immigration Violators

10 Toolkit Goals Minimize the burden and cost of N-DEx participation for LEAs Facilitate mapping from LEA data schema to N-DEx XSD Promote reuse of mappings Provide a basis for automated data transformation Entirely a COTS solution (Sypherlink)

11 Toolkit Analyzer results are used by harvester relationship Manager to facilitate mapping from LEA data schema to N- DEx Requires relational representation of N-DEx Requires expertise with both the data and relational concepts

12 Increment 2

13 Increment 2 (Cont.) Objective Facilitate a network of collaboration in the LE community Features Geographic-based search and visualization Targeted content delivery through automated processing, subscription, and notification services Integrated collaboration environment for ad-hoc investigative teams Analytical/Reporting with user-defined reports High availability system Resolve and correlate entities and cases (Expand to include additional entities) NIBRS (extraction) Entity extraction from text Leveraged Systems None additional

14 Increment 2 (Cont.) CJIS Services NCIC/N-DEx Web Services Interface (Expanded) III (Response in XML) CJIS DMZ Users 100,000 User Extend to investigation teams Data Arrest / Booking Data Incarceration Data Additional attributes Risk Reduction Prototypes Raytheon Usability prototype for subscription/notification, collaboration, and manual entity linking. Raytheon Technology prototype for notification service scalability

15 Increment 3

16 Increment 3 (Cont.) Objective Provide ubiquitous and seamless access to entire LE community Features Standard geocoding of all submitted data Web service interface for all N-DEx services Correlation and analysis to detect crime networks, patterns, and trends Profiles for distinct LE roles (e.g., homicide investigators, crime analysts) Full O&M environment with service level monitoring

17 Increment 3 (Cont.) CJIS Services CJIS Enterprise SMC (metamanager) Users 200,000 Users Broaden to entire LE and CJ community (tactical, administrative, legal) Data Probation/Parole Data Additional attributes Leveraged Sources JABS Risk Reduction Prototypes Raytheon Usability prototype for user role profiles Raytheon Technology prototype for geocoding and role-based correlation algorithms

18 Major Activities, Milestones, and Reviews for Increment 1 System Test Readiness Review (STRR) (CONTROL GATE 5) Prototyping Requirements & Architecture Detailed Design Design Concept Review (DCR) Critical Design Review (CDR) Component Development, Test & Integration Production Test Readiness Review (PTRR) Deployment Readiness Review (DRR) (CONTROL GATE 4) Functional & Interface Testing Deploy to CJIS System Test Acceptance Test Acceptance Test Readiness Review (ATRR) Operational Readiness Review (ORR) Final Design Review (CONTROL GATE 3) Development and Test Implementation and Integration Operations and Maintenance Jul 26 Aug 29 Oct 4 Oct 26 Nov 13 Mar 15 May 8 May 30 Feb 2008 Operational Acceptance Review (OAR) (CONTROL GATE 6) Training, C&A, Deployment Integrated Baseline Review (IBR) May 2 Program Management Week 21 Week 26 Week 31 Week 34 Week 8 Week 4 Week 10 Week 13

19 Continued Role of N-DEx SMEs Raytheon usability prototype and wireframes On-line review and comments Participation over several months as Increment 1 evolves Participation will continue for Increment 2 & 3 Training/Audit Review CBT and Training Guides Review Audit Plan and Guide Participate in Testing Functional and Interface Testing Acceptance Testing Cost Modeling Participate in validation of Cost Modeling Study

20 Service Provider Conference Hosted by IIR and IJIS Institute Held on Wednesday, June 20, 2007 Approximately 53 Service Provider (SP) organizations were represented Raytheon representatives provided sessions on the following: Program Development System Architecture Contributing data sources Sharing policy Agency Integration Agency Integration Toolkit Next steps for RMS service provider collaboration Provided comprehensive question and answer session to address all SP concerns and understand their role in deploying the N-DEx System

21 Questions SSA Tim Reid Unit Chief Deputy Program Manager (304) SSA Edward C. Waigand Data Standards Manager (304) Belinda Cumpston Liaison Specialist Debra Louk Liaison Specialist