"Weaving Your Way Through the Web of Technology Conference 2008" Presentation Transcript
Federal Funding, Standards, and Technology "Weaving Your Way Through the Web of Technology Conference 2008"
Federal Appropriations Process Timeline House and Senate appropriations committees mark up appropriations bills. House and Senate floors vote on their respective appropriations bills. Leading appropriations committee members from both chambers reach a consensus on the appropriations bills, called a conference report. House and Senate floors vote on appropriations conference report. Appropriations bill sent to the President. President signs or vetoes bill. Congress passes continuing resolution if President does not sign bill by Oct. 1. House and Senate appropriations subcommittees develop appropriations bills. Appropriations subcommittees report bills to appropriations committees. House and Senate floors vote on their respective budget resolutions. Leading budget committee members from both chambers develop an agreement on the budget resolution. Both Houses vote on the agreed budget resolution. Budget resolution is reached. President submits his budget proposal to Congress. House and Senate budget committees each formulate a budget resolution. Federal agencies submit funding requests to OMB 2 years out. (e.g., In 2007, agencies submit requests for 2009.) June-October May March-April February September
Training Programs to Assist Probation and Parole Officers (Sex Offender Management)
Victim Notification System (SAVIN)
When Seeking Funds
Did you respond to the established criteria of the RFP?
Did you have someone outside of the process proofread your proposal?
Are your leaders and target community supportive of the application, to include a formal Memorandum of Understanding?
Is your application clearly written and do the headings match the information requested in the RFP?
Do not assume the reviewer understands your needs.
Have you been timely?
The “must have”
NO MORE than 2 ½ pages
The solution (include methodology)
The “elevator speech”
Ability to clearly state the project in a short amount of time
Convey the value; not only to you, but the masses (including that person)
Strong strategic champion
Know the difference between “start up” and “proof-of-concept”
Why programs don’t get funded
Not meeting the guidelines
No clear mission or description of project
Failure to answer questions
Roles of partners not defined
Required partners not identified
Failure to follow directions
Number of copies
No performance measures
Acronym Jungle NIEM PDMP RISS GLOBAL N-DEX R-DEX One DOJ FBI DHS GJXDM LEISP NSA ATF ICE SEARCH NDAA NW3C NGA LEITSC IACP DEA NCIS NSOPW NSOR SAR SAVIN Fusion Center IEPD
The National Criminal Intelligence Sharing Plan
National Strategy for Information Sharing
Information Sharing Environment (ISE) Implementation Plan
Fusion Center Guidelines
What Is a Fusion Center?
Defined as a “collaborative effort of two or more agencies that provide resources, expertise, and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity”
State and major urban area fusion centers are key to the nationwide information sharing framework
Why Is the Fusion Process Important?
Supports an all-sources, all-crimes, all-hazards, all-threats approach to intelligence
Blends data from different sources, including law enforcement, public safety, and the private sector
Supports risk-based, information-driven prevention, response, and consequence management programs
Supports intelligence-led policing
Fusion is the overarching process of managing the flow of information and intelligence across all levels and sectors of government and the private sector
Current State of States
Development of Formalized Regions
Formalized regions will
Leverage existing resources
Facilitate delivery of DHS/DOJ Fusion Process Training and Technical Assistance program offerings
Northeast Southeast Midwest West
Current Fusion Center Efforts
Designation of a primary fusion center within state
Nationwide assessment of fusion center capabilities by DHS and DOJ
Addressing use of National Guard personnel within fusion centers
National Information Exchange Model (NIEM)
Development of Regional Training and Technical Assistance
Information sharing is a national imperative In detecting, preventing, responding to and investigating crimes, disasters and terrorist acts, the exchange of information among multiple engaged agencies must be timely and accurate and therefore highly automated . Most existing computer systems are not designed to facilitate information sharing across disciplines and jurisdictions. Automated information sharing between agencies requires the definition of common standards for linking disparate systems among federal, state, local and tribal agencies.
A data standard
with agreed-upon terms, definitions , and formats.
Independent of the way data is stored in individual systems.
A way to achieve consensus on the content of specific exchanges
A structured approach to data interoperability
Participating Communities and Governance Defining Data Components Defining data components unique to a domain will be done by subject matter experts who are representatives of the domain following basic rules for definitions and terms A group representing all participating domains will define those data components that are universal or commonly used by more than one domain again using the same basic rules
How NIEM Works to Support Information Sharing
Create a scenario to define the need for information sharing between organizations
Define the requirements including the data components that should be included
Use the data component standards from NIEM to design the exchange, extending them where needed
Document the exchange using technology standards
Implement the exchange
Scenario Planning Requirements Analysis Data Mapping Publish and Implement
Federal Adoption and Use
OASIS Electronic Court Filing Technical Committee plans a 2008 release of IEPDs conformant with NIEM.
DOJ programs, such as LCMS and Sentinel, through their system design efforts are ensuring their exchanges will be NIEM-conformant.
DHS built a Hospital Availability IEPD and is planning or building 10 other NIEM-conformant IEPDs, including Federated Person Query and Terrorist Watchlist.
The Program Manager-Information Sharing Environment has declared that NIEM will be the standard for sharing counterterrorism information.
FBI has released the preliminary IEPD and schema for N-DEx consistent with release 2.0 of NIEM.
FBI has created an IEPD based on the planned interface between N-DEx and Sentinel.
FEMA has developed some specific NIEM-compliant schema – vetted through the NIEM Help Desk – for partner agencies at the federal, state, tribal and local levels to use for external data submission exchanges with the Homeland Security Exercise and Evaluation Program (HSEEP) Toolkit.
State & Local Adoption and Use
New York Division of Criminal Justice Services is utilizing NIEM to implement all CJIS information exchanges.
Florida is utilizing NIEM for all law enforcement information exchanges.
Pennsylvania JNET project is developing a plan for upgrading its installed GJXDM based information exchanges to NIEM.
Texas has begun to develop a plan for statewide adoption of NIEM as the standard for information exchanges.
Maryland Department of Transportation is exploring the use of NIEM for information exchanges between transportation centers and public safety.
California is planning to convert their court content management system interfaces to NIEM and to map their e-filing standard (2GEFS) to NIEM.
New York state and NLETS are developing a NIEM RAP Sheet pilot IEPD.
Why NIEM Now?
1. NIEM Is Tested, Ready, and in Production.
2. Documentation and Tools Are Available.
3. Training and Technical Assistance Are Available.
4. A Release Plan Is in Place.
5. Current and Future Grants Mandate NIEM Conformance.
6. Reference IEPDs Are Being Developed.
7. NIEM Is the Means for Intergovernmental Information Sharing.
SAR Operational Study
Partnership between PM-ISE, DOJ, DHS, DOD
Minimum 3 locations to reflect fusion center, law enforcement, and military (force protection)
Two SAR (Suspicious Activity Report) elements
Summary SAR repository (without PII)
Connection of participants to share SAR (with PII)
Architecture specifically design to connect fusion centers allowing them to search SAR information
Intention to expand to all 50 states and UASI sites
Summary SAR Library
Summary SAR Search
Summary Suspicious Activity Report Search The document obtainable through this search engine are those produced by Fusion Centers and are designed to be summary in nature describing incidents/contacts/activity and do not contain person identifying information (PII), The documents searched are in a free text format such as MS Work, Adobe, WordPerfect. Etc. Enter single word, multiple words, or phrase:
For the most optimum results use the following format suggestions
MULTIPLE WORDS – use “+” sign between, ex. Truck +bridge +photos
PHRASE – for specific phrase enclose in quotation, ex. “green pickup”
Select time frame of entered documents to be searched: SEARCH Between MO DAY YR 30 days 60 days 90 days ALL State
RESULTS PAGE RETURN TO SEARCH NEW SEARCH 95% 85% 72% 50% 94% 20% Summary SAR Search STATE FUSION CENTER DATE ENTERED Match NY Albany 3/4/2007 VA Richmond 3/11/2008 VA Richmond 4/10/2008 IL Chicago 3/16/2008 FL FDLE 4/1/2008 FL FDLE 4/8/2008
Contact Information New York State Intelligence Center Person submitting document Larry Jones, Intelligence Analyst 518-555-1234 [email_address] Contact for verifying information Lt. Mary Smith, Unit Commander 518-555-4321 [email_address] Summary SAR Search
Summary Distributive Model
SAR SBU Access Point SAR IEPD SEARCH PAGE RESULTSPAGE SAR SAR IEPD SAR SAR IEPD SEARCH RESPONSE
What is 28 CFR Part 23?
28 Code of Federal Regulations (CFR) Part 23 is a regulation governing interjurisdictional and multijurisdictional criminal intelligence systems
These are operated by or on behalf of state and local law enforcement agencies and that are funded with certain federal funds.
It is a federal regulation issued by the U.S. Department of Justice in 1980, revised in 1993, and clarified in 1998 to address circumstances evolving with changing technologies and law enforcement needs.
Is currently under revision review.
It is applicable to “criminal intelligence systems,” offering guidance on the collection, storage, and dissemination of criminal intelligence information.
Maintaining the National Gang Center ( www.nationalgangcenter.org )
Conducted 2005 National Gang Threat Assessment with NAGIA, FBI, ATF, NDIC
Developing gang enforcement training for local law enforcement (basic, advanced, commander, CEO)
Regional Information Sharing Systems
RISS Geographical Regions WSIN RMIN MOCIC ROCIC MAGLOCLEN NESPIN
Elements of the Program
Supports investigative and prosecution efforts of member agencies
Structured system facilitates communication and cooperation among law enforcement agencies
Centers are prohibited from operational case involvement
Membership Support Services
Technical assistance (field staff)
Summary of Support Services
Investigative and intelligence analysis support – RISS produced over 21,000 analytical products in FY2006. RISS creates link charts, telephone toll analysis, crime scene diagrams and other products. RISS also supports computer forensics and video and audio enhancements.
Equipment sharing – RISS loans over 4,500 pieces of specialized equipment annually.
Investigative funds support – RISS loans confidential funds to member agencies to support investigations, including purchase of services and contraband, as well as case travel and other assistance.
Criminal activity bulletins and publications – RISS produces almost 200 publications annually and distributes them to nearly 300,000 law enforcement personnel.
Training – In FY2006, more than 65,000 officers were trained.
Technical assistance – RISS field staff liaise with member agencies to ensure deliver of RISS services and to provide support regarding RISSNET installation and training.
RISS Automated Trusted Information eXchange — (ATIX)
A vehicle for nationwide dissemination of national security information
Allows access to the secure network by non-RISS members
Includes Public Service, Public Safety, Public Utility, EMS, Governors, Mayors, Airport Security
States will usually manage ATIX tier access
Designed to store and maintain data on all planned law enforcement events, (e.g., raids, controlled buys, surveillances)
Goal to identify and alert affected agencies of potential conflicts impacting law enforcement efforts.
Will be used in conjunction with mapping software, data on event locations will be verified when officers enter information into the system or when RISS staff members assist officers.
RISS staff at the Watch Center will assist officers, monitor activities, respond to conflicts, and notify affected parties
Currently in testing status and has funding for national implementation
NEED TO KNOW
Where to find funding opportunities
Your representation at BJA
SAA (PCCD in PA)
Tracey Willis (State Policy Advisor for PA)
Byrne Solicitation to be posted soon
Preventing Crime and Drug Abuse
Enhancing Local Law Enforcement
Enhancing Local Courts
Enhancing Local Correction and Offender Re-entry
Facilitating Justice Information Sharing
Mr. David P. Lewis Senior Policy Advisor Justice Information Sharing (202) 616-7829 [email_address] Questions?