Learn how the Elastic Stack helped the Will County Sheriff's Office build Network Monitoring and Security, Operational Analysis at the Will County Adult Detention Facility, and Crime Analysis for their area.
How to Troubleshoot Apps for the Modern Connected Worker
Will County Sheriff’s Office: Solving Crime with Data
1. 1
Steve Caruso October 1st, 2019
Director of IT Will County Sheriff’s Office
@blackfire43 @WillCoSheriff
Elastic Within The Will
County Sheriff’s Office
2. 2
Start At The Beginning –
Where and How The
Journey Began
The spark that started the flame
3. 3
Behind the Curtain of the IT Department
• Maintain roughly 400 desktops, 275 laptops and tablets, 75 printers
‒ 185 Laptops in squad cars disconnected from Sheriff’s Network
‒ Over 100 In-Car camera systems
• Manage 52 servers
• Support 625 users
• 24 x 7 environment
• Multiple Sheriff run websites, several On-Prem software solutions, a few cloud
SaaS offerings, and security systems at our court facilities and stations
• And more often than not, anything else that plugs in and has a power button
• 6 full-time highly skilled and energetic employees
Who we are and what we do
4. 4
Google Earth Mapping
Project
Using KML files to map data
• Individual files with one master
file
• Automated file generation
through VB.net
• Mapped items like:
‒ Crimes – 7 to 90 days
‒ Active Warrants
‒ Sex Offenders
‒ Violent Offenders
‒ Parolees and Probationers
8. 8
SIEM &
INFRASTRUCTURE
MONITORING
Watching our network
and servers closely
Elastic Use Cases
DATA ANALYSIS
& BI
Looking at
operational data for
better decision
making
CRIME ANALYSIS
Facilitating a system to
combat crime, and
distribute to 26 Will
County Law
Enforcement Agencies
3 2 1
After about 2 years of jumping in head first, we have 3 use cases.
Local On Premise Cluster Elastic Cloud
9. 9
Being A Fly On The Wall
In Our Server Room And
Network Infrastructure
Use Case 3 – SIEM and Network Monitoring
10. 10
Network and Hardware
Monitoring
More in-depth picture
Server Metrics
Keeping an eye on hardware performance in our virtual
environment
Network Events
Watching for foreign entities that do not belong on the
network
Packet Tracing
Keeping track of what is passing over the network and
making sure nothing has gone rogue
Windows Logs
Keeping track of Windows logs across all monitored
servers to find common issues
12. 12
Network and Hardware
Monitoring
More in-depth picture
Server Metrics
Keeping an eye on hardware performance in our virtual
environment
Network Events
Watching for foreign entities that do not belong on the
network
Packet Tracing
Keeping track of what is passing over the network and
making sure nothing has gone rogue
Windows Logs
Keeping track of Windows logs across all monitored
servers to find common issues
13. 13
Network and Hardware
Monitoring
More in-depth picture
Server Metrics
Keeping an eye on hardware performance in our virtual
environment
Network Events
Watching for foreign entities that do not belong on the
network
Packet Tracing
Keeping track of what is passing over the network and
making sure nothing has gone rogue
Windows Logs
Keeping track of Windows logs across all monitored
servers to find common issues
14. 14
Network and Hardware
Monitoring
More in-depth picture
Server Metrics
Keeping an eye on hardware performance in our virtual
environment
Network Events
Watching for foreign entities that do not belong on the
network
Packet Tracing
Keeping track of what is passing over the network and
making sure nothing has gone rogue
Windows Logs
Keeping track of Windows logs across all monitored
servers to find common issues
15. 15
Letting The Data Have A
Voice In Daily Operations
And Decisions
Use Case 2 – Data Analysis and Information Presentation
16. 16
Data Analysis and Business Intelligence
Driven Workflow for Better Decisions
• Employee Time and Attendance
‒ Tracking time off trends for better staffing and scheduling
• Crime Activity
‒ Placing deputies based on current and forecasted trends
• General Operations Oversight at Adult Detention Facility
‒ Building Canvas Boards for watching events happening throughout the facility in real time
instead of running static reports
• Officer Canvas Boards for Daily Activity
‒ Having a dashboard in each Pod (Cell Block) so the officer can track Pod activity, special
diets, scheduled events, and security checks
Taking data at hand and using it to better understand our operations
20. 20
The Big Picture Made Up
Of Smaller Pictures
Drawn From Bits of Data
Use Case 1 – Crime Analysis and Mapping
21. 21
Let’s Play A Game.
Can you name the
most pulled over
vehicle by sex,
make, model and
color
22. 22
Let’s Play A Guessing
Game - Males
What kind of car is pulled over the most?
Males
55,798 Citations – 64.54%
Chevrolet
10,219 of the Male Drivers – 35.70%
2nd Ford – 8,288 (28.95%) 3rd Dodge – 3,959 (13.83%)
Impala
683 of the Chevrolet Drivers – 29.23%
2nd Silverado – 557 (23.83%) 3rd Malibu – 552 (23.62%)
Silver
161 of the Impala Drivers – 31.63%
2nd Black – 122 (23.97%) 3rd White – 101 (19.84%)
23. 23
Let’s Play A Guessing
Game - Females
What kind of car is pulled over the most?
Females
30,661 Citations – 35.46%
Chevrolet
5,077 of the Female Drivers – 33.89%
2nd Ford – 3,493 (23.32%) 3rd Honda – 2,288 (15.27%)
Malibu
464 of the Chevrolet Drivers – 33.48%
2nd Impala – 377 (27.20%) 3rd Equinox 216 (15.58%)
Silver
89 of the Malibu Drivers – 25.21%
2nd Grey – 84 (23.80%) 3rd Black – 70 (19.83%)
32. 32
Roadmap For Crime Analysis Implementation
4 steps to greater cooperation of law enforcement in Will County
Internal Sheriff’s
Office Testing and
Incorporating
External Data
1 2 3 4
Finalize Data Access,
Present to Chief’s of
Police, Get Signed
Agreements
Determine Program
Governance, Role
Out Version 1
Dashboards,
Machine Learning
Canvas
Implementation,
Graph Relationships,
Vega Visualization
Integration
33. 33
Thank you for taking some time to
learn how the Will County Sheriff’s
Office is utilizing the Elastic Stack.
Hopefully this will help you as you
work to implement your own Elastic
Stack solution.
SHERIFF MIKE KELLEY