Presentation is loading. Please wait.

Presentation is loading. Please wait.

Montana Digital Summit Cross Boundary Collaboration

Similar presentations


Presentation on theme: "Montana Digital Summit Cross Boundary Collaboration"— Presentation transcript:

1 Montana Digital Summit Cross Boundary Collaboration
4/16/2017 9:03 PM Montana Digital Summit Cross Boundary Collaboration Colin Nurse Chief Technology Officer State & Local Government Microsoft Corporation © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 Agenda Social Capital and Networking Areas of Opportunity & Go Do’s
Fusion CETS E-Sponder

3 What Is Social Capital? “Social capital refers to the resources available in and through our personal and business networks. These resources …include information, ideas, leads, business opportunities, financial capital, power and influence, emotional support, even goodwill, trust, and cooperation.” Wayne Baker Achieving Success Through Social Capital (Jossey-Bass 2000) It needs all players to see the bigger picture Turf issues hold collaboration and progress up It can take courage as this collaboration is alien to most Think of where Collaboration exists today, typically this is where individual relationship are strong In any case for this to work people need to trust and work toward the bigger picture Is mine all mine

4 Areas of Opportunity & Go Do's
Justice & Public Safety - with Terrorism and Cyber Crime, There are no boundaries or jurisdiction Healthcare, Federal, State, County & City health systems under huge stress financially, Offender Systems CRM, Constituents insist on one face for Government interaction, 311, Permits, New Business Licenses Governments one view of the Constituent , name, DOB, SSN, Address DR Considerations, Millenniums

5 Fusion Project Direct response to intelligence and information sharing failures – 9/11, London, Saudi Oil Co. Federal government has failed to establish a top-down approach NGA – Set as a high priority 70 sites in operation today No technology standard or best practices are in place Funding available through grants Having lived with Terrorism in the UK for 30 years I ran to this project when I was asked to play a small role Played a role in helping draft the DOJ/DHS Fusion Center Guidelines Direct response to the Presidents edict on cross boundary data sharing The next attack is coming of that there is no doubt We need these centers to be working to protect the nation Did you know that one of the Hijacker pilots was stopped on I95 for speeding, he was on a wanted list however the trooper did not have access to the wanted list. Did you know that Mohammed Atta went to a Pharmacy with chemical burns to his hands and full filling a prescription for Antibiotics, that could be used to treat Anthrax Did you know where the first Anthrax incident occurred Florida, The enquirer had run a negative article on Fundamental Extremist Muslims Who knows who found the first clues that drove the investigation in to the Glasgow bombings An EMT guy

6 Turning information and intelligence into actionable knowledge
FUSION – What is it A cross boundary collaborative multi-disciplinary public safety and private sector real or virtual organization where information is collected, integrated, evaluated, analyzed, and disseminated to support efforts to anticipate, identify, prevent, monitor and respond to criminal and terrorist activity Turning information and intelligence into actionable knowledge Assumptions Multi-use: crime, terrorism, all hazards The essence of prevention and response: State and local responders Information sharing Information sharing will either be evolutionary or revolutionary Someone testing out security say at a power plant on its own not really an issue however take that snippet or picture mix it with other data and potential different picture emerges The Fire officer seeing something unusual during a Fire inspection A nurse coming across unusual injuries treated at a local The old lady spotting divers with strange breathing apparatus near a bridge All of these types of data today have one place to go There is a direct correlation between crime and terrorism, funding for the task is critical

7 FUSION guidelines Create a collaborative environment for the sharing of intelligence and information among local, state, tribal, and federal law enforcement agencies, public safety agencies and private sector Leverage the databases and systems available via participating entities to maximize information sharing Create an environment in which participants seamlessly communicate by leveraging existing systems and those under development and allow for future connectivity to other local, state, tribal and federal systems – Global Justice Extensible Markup Language (XML) Integrate technology, systems, and people, Collaboration Ensure appropriate security and privacy measures are in place for the facility, data and personnel Taken form the Fusion Center guidelines Collaborate collaborate collaborate Use existing system, investments cannot be thrown away

8 Potential Collaboration Partners
Agriculture, food, water, the environment Banking and finance Chemical Industry, hazardous materials Criminal Justice Education Emergency services Energy Government Health and Public Health Hospitality and lodging Information, telecom Military Postal and shipping Private security Public works Real estate Retail Social services Transportation This transformation to a collaborative environment will be evolutionary or revolutionary if we are not ready before the inevitable next attack

9 Project CETS – What is it
A unique software tool designed by investigators for investigators to share, search and collaborate on investigations relating to child exploitation. Child Exploitation Tracking System The Child Exploitation Tracking System (CETS) is a unique software tool developed by Canadian police, international law enforcement officials, and Microsoft Corporation to help battle child exploitation online. Pronounced "kets," this tool helps law enforcement officials collaborate and share information with other police services based on legal agreements in place. Law enforcement officials turned to Microsoft to help solve a significant challenge they faced. CETS was created to increase the effectiveness of investigators and teams by providing them with software to store, search, share, and analyze large volumes of evidence and match cases across police agencies. From Concept to Delivery Working together, Canadian police and Microsoft developed CETS in response to a personal e mail plea in January 2003 by Toronto Police Service Sergeant Paul Gillespie to Microsoft Chairman and Chief Software Architect Bill Gates. Microsoft contributed technical expertise and resources for a system designed by law enforcement for law enforcement. It took the involvement of many from around the world to develop CETS: the Royal Canadian Mounted Police and the National Child Exploitation Coordination Centre; 26 Canadian police services; the U.S. Department of Homeland Security; the National Crime Squad of the U.K. and Scotland Yard; and Microsoft.

10 Project CETS – The problem
500,000 original images on Internet 50,000 different child victims, only 500 identified, less arrests made 200,000 sites offering child abuse images 30% of children experienced sexual solicitation on-line, but only 10% of parents are aware Estimated to be a 8-billion dollar industry. Works across boundary, across jurisdiction and across the world Addressing a Global Need Online child exploitation is a serious problem, as Internet crimes, especially those involving children, are increasing at an unprecedented rate. Industry and law-enforcement agencies must do everything possible to stop and reverse the trends described below. One in seven children (10 to 17 years old) receives unwanted sexual solicitations online according to ECPAT International. New figures from the Internet Watch Foundation's Annual Report show the severity of online child abuse content is increasing, with a four-fold rise in images depicting the most severe abuse. The report goes on to outline the following key figures for 2006: 31,776 reports were processed by IWF "Hotline," which represents a 34 percent increase on 2005 91 percent of victims, depicted in URLs confirmed to be abusive, appear to be under 12 years old Child abuse images (commercial and non-commercial) of levels 4 and 5 (the most severe) increased from 7 percent in 2003 to 29 in 2006.

11 CETS Today Canadian law enforcement connected in 9 provinces; 182 users. Multiple arrests attributed in part to CETS Deployed and launched in 14 countries, Brazil, Canada, Chile, Indonesia, Italy, the UK, Spain and Romania An additional 7 Countries and Agencies are actively evaluating CETS 700 investigators are currently using CETS worldwide A total of 1300 investigators have been trained on CETS CETS Today Collaboration and analysis are the key benefits that CETS offers to law enforcement. Collaboration. Agencies can break down borders through collaboration and information sharing. Using standard Web- based technologies, law enforcement agencies can collaborate on investigations into the exploitation of children using security-enhanced technologies. From a technical perspective, CETS is based on Extensible Markup Language (XML), so investigators can both provide and receive information from almost any computer system that contains relevant data, regardless of the hardware or software. Analysis. Agencies can use powerful computer tools to fight computer crime. CETS contains powerful features to permit investigators to easily import, organize, analyze, share, search and link information from the point of detection right through the investigative phase, and on through the arrest and conviction. CETS has been deployed in Canada, Chile, Brazil, Indonesia, Italy, and the United Kingdom. Thirteen other countries are in various stages of implementing or have expressed interest in the system. Microsoft continues to collaborate with governments and law enforcement agencies worldwide on the broader implementation of CETS.. CETS already has played a part in several investigations across geographic boundaries, creating links that have helped apprehend online offenders and, most important, lead to the rescue of children in countries around the world. "CETS allows the police to piece together an investigative puzzle whose pieces are spread out over Canada, and in some cases around the world," said Constable Detective Arnold Guerin, Technology Manager NCECC. "By collaborating through CETS police are able to share information regardless of jurisdiction." Toronto Police Services and the RCMP Collaborate with Microsoft Against Child Exploitation, July

12 E-Sponder – Event & Incident Management
The Customer The Tampa Police Department works to reduce crime and enhance the quality of life for citizens in Tampa, Florida. The department has 1,000 police officers and 350 administrative employees. The Problem The Tampa Police Department needed a Web-based collaboration environment that could foster multi-agency collaboration & coordination to ensure security and public safety for Super Bowl XLIII. Tampa, Florida, is a popular tourist destination. It is also host to approximately 800 special events a year. In February 2009, the city hosted Super Bowl XLIII. The Super Bowl is one of the only major sporting events in the United States to receive a national security designation, which significantly increases the requirements of the security plan. The game, which was played at the city’s Raymond James Stadium, home of the Tampa Bay Buccaneers, drew more than 100,000 fans to the city. The large crowds were a challenge to crime prevention and public safety, and the agency responsible for coordinating and implementing event security was the Tampa Police Department. Multi-Agency Coordination Although the Tampa Police Department functioned as the lead agency and the incident command for the event, more than 25 different organizations were involved in planning and managing security for Super Bowl XLIII. This included the Tampa Bay Urban Area Security Initiative (UASI) region, a joint taskforce comprising law enforcement, emergency management, and public health and safety organizations from nine counties. It also included federal agencies such as U.S. Customs and Border Protection, and the Federal Bureau of Investigation. With so many agencies involved, and people’s safety at stake, cross-departmental collaboration was essential. “The event required a supporting technology for our incident command system that could break things down into manageable pieces,” says Major John Bennett, Super Bowl Incident Commander and District Two Commander in the Tampa Police Department. “With more than two dozen groups reporting back to me—including SWAT teams, bomb squads, mounted police, and other patrols—coordinating operational perimeters was a major challenge.” A Super Bowl game itself lasts only a few hours, but the security preparation for it takes up to 18 months. During that time, the agencies involved plan their operational strategies, which include defining jurisdictional areas, allocating resources, stationing personnel, and preparing for unplanned events such as natural disasters or terrorist activities. This planning requires a massive information-gathering effort. For instance, for the recent Tampa game, U.S. Customs and Border Protection, responsible for enforcing airspace restrictions, needed to understand the flight plans for the Tampa Police Department’s patrol helicopters. And, with so many different law enforcement agencies involved, upfront planning and coordination was required to smoothly manage any arrests and prosecutions. A major goal for the Tampa event was to use a collaboration solution that was compliant with the National Incident Management System (NIMS), which provides a systematic approach to incident management and collaboration among multiple jurisdictions, agencies, and organizations.

13 E-Sponder – Event & Incident Management
The Solution The Tampa Police Department used E•SPONDER, a command-and-control platform based on typical tools in use daily within the Police department. The solution provides Web-based collaboration, in-depth reporting capabilities and Situational awareness.

14 Video

15

16 Benefits Dynamic situational awareness
Standard templates, JPS Standards based Taxpayer savings – 88% savings v Other Super Bowls Connectivity Interoperability, Key Point Multi Use, Template driven, always improving Flexible, customizable system User Experience Planning for Super Bowl XLIII began, in earnest, in early 2008, coinciding with a significant downturn in the economy. “This was another big challenge,” says Bennett. “When Tampa landed the Super Bowl in 2005, we were not in the midst of recession. Then, in 2008, a year before the event, we had entered a recession, our budgets were cut, and the police department found itself having to work with about 25 percent of the money that had been spent on the last two Super Bowl games. And yet we still had to ensure public safety.” The entire City of Tampa, including law enforcement, had been allocated a budget of U.S.$1 million to manage Super Bowl XLIII. “In previous Super Bowl games, host cities spent three times this amount on law enforcement alone,” explains Bennett. “In this economic environment, it was critical that we manage our resources wisely, that we allocate them well in advance, and apply a strict economic monitor to all of our plans. It was also important that the department invest in a solution that was useful in more situations than just the Super Bowl event. “One of the main mantras of the UASI, led by the Tampa Police Department’s Assistant Chief Jane Castor, was to acquire equipment and technology that would enhance our overall capabilities and would not just sit on a shelf at the expense of the taxpayers until the day of an event,” explains Bennett. As a planning tool, E•SPONDER helped the department avoid overallocation of resources. “I say all the time to my officers, ‘Only results count.’ We ran a safe and efficient Super Bowl. E•SPONDER helped us avoid a huge tab at the end of it, because we didn’t oversaturate with resources. We accomplished true strategic planning. The Office SharePoint Server 2007–based system helped us manage Super Bowl security at the local level for only $350,000. That’s merely 12 percent of the host city law enforcement costs of recent Super Bowls.” In other situations, such as hurricanes or other natural disasters, the solution can also lessen the resulting financial burden for taxpayers. E•SPONDER reporting capabilities “The Office SharePoint Server 2007 technology doesn’t drive the department; it supports us, as good technology should.” Major John Bennett, Super Bowl Incident Commander and District Two Commander, Tampa Police Department can be used by the department to easily deliver reports to the Federal Emergency Management Agency (FEMA), which may help it offset emergency response costs with federal funds. “The 2004 hurricane season largely drove our quest for a tool like this,” explains Bennett. “E•SPONDER follows the NIMS model and provides a general technology structure that we can apply to any situation—not just the Super Bowl.”

17 4/16/2017 9:03 PM © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Montana Digital Summit Cross Boundary Collaboration"

Similar presentations


Ads by Google