[presentation]

23
1 BJA Update: BJA Update: Information Sharing Information Sharing Initiatives Initiatives NAJIS 2007 Conference NAJIS 2007 Conference October 17, 2007 October 17, 2007

Upload: zubin67

Post on 08-Jun-2015

384 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: [PRESENTATION]

1

BJA Update:BJA Update:Information Sharing Information Sharing

InitiativesInitiatives

NAJIS 2007 ConferenceNAJIS 2007 Conference

October 17, 2007October 17, 2007

Page 2: [PRESENTATION]

2

Information Sharing InitiativesInformation Sharing Initiatives Global InitiativesGlobal Initiatives

National Information Exchange Model National Information Exchange Model (NIEM)(NIEM) Global Federated Identity and Privilege Global Federated Identity and Privilege

Management Management (GFIPM)(GFIPM) Justice Reference Architecture/Service Oriented Justice Reference Architecture/Service Oriented

Architecture Architecture (JRA/SOA)(JRA/SOA)

National Information Sharing Environment National Information Sharing Environment (ISE)(ISE) Program Manager – Information Sharing Program Manager – Information Sharing

Environment (PM-ISE)Environment (PM-ISE) Fusion Centers (Public Law 110-53 of 3 Aug 2007)Fusion Centers (Public Law 110-53 of 3 Aug 2007) Suspicious Activity Reporting (SAR)Suspicious Activity Reporting (SAR)

Page 3: [PRESENTATION]

3

Information Sharing InitiativesInformation Sharing Initiatives

Justice Oriented Architecture InitiativesJustice Oriented Architecture Initiatives JRA/SOA and Shared ServicesJRA/SOA and Shared Services DOJ Information Sharing Segment Architecture DOJ Information Sharing Segment Architecture

(ISSA)(ISSA)

ONE DOJ InitiativeONE DOJ Initiative Law Enforcement Information Sharing Program Law Enforcement Information Sharing Program

(LEISP)(LEISP) Regional Data Exchange (R-DEx)Regional Data Exchange (R-DEx) Law Enforcement Sharing Program Exchange Law Enforcement Sharing Program Exchange

Specifications (LEX 3.1)Specifications (LEX 3.1)

Page 4: [PRESENTATION]

4

Information Sharing InitiativesInformation Sharing Initiatives

FBI InitiativesFBI Initiatives National Data Exchange (N-DEx)National Data Exchange (N-DEx) National Crime Information Center (NCIC) XML PlansNational Crime Information Center (NCIC) XML Plans

PrivacyPrivacy Policy Development Guide and Implementation Policy Development Guide and Implementation

TemplatesTemplates Training and Technical Assistance SupportTraining and Technical Assistance Support Technical Framework for Implementing Privacy Technical Framework for Implementing Privacy

PolicyPolicy Information Quality InitiativeInformation Quality Initiative Support to Federal Sector (PM-ISE)Support to Federal Sector (PM-ISE)

Page 5: [PRESENTATION]

5

Information Sharing InitiativesInformation Sharing Initiatives

Other BJA Sponsored InitiativesOther BJA Sponsored Initiatives National Motor Vehicle Title Information National Motor Vehicle Title Information

System (NMVTIS) – currently 20 statesSystem (NMVTIS) – currently 20 states Prescription Drug Monitoring Programs (PDMP)Prescription Drug Monitoring Programs (PDMP) State-Wide Automated Victim Information and State-Wide Automated Victim Information and

Notification (SAVIN) ProgramNotification (SAVIN) Program Public Safety Interoperability Project Public Safety Interoperability Project

(IJIS/APCO)(IJIS/APCO) Intelligent Transportation Systems Public Intelligent Transportation Systems Public

Safety Program – IEEE/NIEM IntegrationSafety Program – IEEE/NIEM Integration Dru Sjodin National Sex Offender Public Dru Sjodin National Sex Offender Public

Registry (NSOPR)Registry (NSOPR)

Page 6: [PRESENTATION]

6

IJIS Institute Support ActivitiesIJIS Institute Support Activities

Training and Training and Technical AssistanceTechnical Assistance

NIEM Help DeskNIEM Help Desk APCO CollaborationAPCO Collaboration Fusion Center Fusion Center

SupportSupport N-DEx SupportN-DEx Support National Training National Training

SeminarsSeminars Global CommitteesGlobal Committees

SAVINSAVIN PDMPPDMP ITS/Public Safety ITS/Public Safety

(IEEE Link)(IEEE Link) CAD/RMSCAD/RMS Emerging Emerging

TechnologiesTechnologies Security and PrivacySecurity and Privacy NIMSNIMS

Page 7: [PRESENTATION]

7

Information Sharing InitiativesInformation Sharing Initiatives

Homeland Security Information Homeland Security Information Exchange Packages (IEPD’s) – Exchange Packages (IEPD’s) – Approximately 40Approximately 40 Hospital Availability Exchange (HAvE)Hospital Availability Exchange (HAvE) Customs and Border Protection (CBP)Customs and Border Protection (CBP)

6 IEPD’s Under Development6 IEPD’s Under Development Citizenship and Immigration Services (CIS) – Citizenship and Immigration Services (CIS) –

Federated Person QueryFederated Person Query Transportation Security Administration (TSA)Transportation Security Administration (TSA)

Alerts and Warnings IEPD’sAlerts and Warnings IEPD’s

Page 8: [PRESENTATION]

8

Information Sharing InitiativesInformation Sharing Initiatives

Homeland Security Information Homeland Security Information Exchange Packages (IEPD’s) – Exchange Packages (IEPD’s) – ContinuedContinued Federal Emergency Management Federal Emergency Management

Administration (FEMA) - 2 IEPD’s Administration (FEMA) - 2 IEPD’s Focusing on Exercise SchedulingFocusing on Exercise Scheduling

Immigration and Customs Enforcement Immigration and Customs Enforcement (ICE)(ICE)

Person Query IEPD’s focused on Removable Person Query IEPD’s focused on Removable Aliens and Student Visa’sAliens and Student Visa’s

Page 9: [PRESENTATION]

9

Information Sharing InitiativesInformation Sharing Initiatives

Homeland Security Information Homeland Security Information Exchange Packages (IEPD’s) – Exchange Packages (IEPD’s) – ContinuedContinued National Protection and Programs National Protection and Programs

Directorate (NPPD)Directorate (NPPD) Geospatial Emphasis on Infrastructure Geospatial Emphasis on Infrastructure

ProtectionProtection Integrated Common Analytical Viewer (iCAV) Integrated Common Analytical Viewer (iCAV)

to provide geo-location focus for natural and to provide geo-location focus for natural and man-made disastersman-made disasters

U.S. Visit – 4 IEPD’s Tracking Biometrics U.S. Visit – 4 IEPD’s Tracking Biometrics for non-U.S. Citizensfor non-U.S. Citizens

Page 10: [PRESENTATION]

10

Information Sharing InitiativesInformation Sharing Initiatives

Homeland Security Information Exchange Homeland Security Information Exchange Packages (IEPD’s) – ContinuedPackages (IEPD’s) – Continued Office of Science and Technology (OS&T)Office of Science and Technology (OS&T)

Emergency Data Exchange Language (EDXL) and Emergency Data Exchange Language (EDXL) and Common Alerting Protocol (CAP) Standards (OASIS Common Alerting Protocol (CAP) Standards (OASIS Standards)Standards)

First Responder CredentialingFirst Responder Credentialing National Incident Management System (NIMS) National Incident Management System (NIMS)

Reference IEPDReference IEPD Situation Reporting IEPDSituation Reporting IEPD

Coast Guard – Ships Automated Information Coast Guard – Ships Automated Information System (AIS)System (AIS)

Page 11: [PRESENTATION]

11

State and Local InitiativesState and Local Initiatives

Ohio (RMS)Ohio (RMS) New YorkNew York Minnesota (SOA)Minnesota (SOA) Virginia (VCIN)Virginia (VCIN) WisconsinWisconsin

CDCLCDCL Gateway SOAGateway SOA Warrant/Protection Warrant/Protection

OrdersOrders Washington Washington

(SOA/NIEM)(SOA/NIEM)

Maine (JRA)Maine (JRA) Pennsylvania Counties Pennsylvania Counties

(BPMN)(BPMN) Seattle (SeaJIS)Seattle (SeaJIS) Massachusetts (Public Massachusetts (Public

Safety Warehouse)Safety Warehouse) NLETSNLETS

CHIEF ProjectCHIEF Project Photo SharingPhoto Sharing

Page 12: [PRESENTATION]

12

Bob GreevesBob Greeves

Bureau of Justice AssistanceBureau of Justice Assistance

www.it.ojp.govwww.it.ojp.gov

Email: Email: [email protected]@usdoj.gov

Phone:Phone:

(202) 305-9317(202) 305-9317

Page 13: [PRESENTATION]

13

End of Presentation CoreEnd of Presentation Core

Page 14: [PRESENTATION]

14

About NIEMAbout NIEM

July 31 2.0 ReleaseJuly 31 2.0 Release Wide Scale Wide Scale

AdoptionAdoption GJXDM Integration GJXDM Integration

(XSTF Continues)(XSTF Continues) Domain Version Domain Version

IndependenceIndependence Special Conditions Special Conditions

on Grantson Grants Migration Support Migration Support

ToolsTools

Training and T.A. Training and T.A. AvailableAvailable

Building Repository Building Repository of IEPD’sof IEPD’s

Many NIEM Many NIEM Documents AvailableDocuments Available

Help Help Desk/Knowledge Desk/Knowledge CenterCenter

Sign up for NIEM Sign up for NIEM News News (Return) (Return)

Page 15: [PRESENTATION]

15

About GFIPMAbout GFIPM Global Federated Identity and Privilege Global Federated Identity and Privilege

Management (GFIPM)Management (GFIPM) Authentication (Identification)Authentication (Identification) Authorization (Privilege Management) – Authorization (Privilege Management) –

Certifications, Clearances, Job Functions, Certifications, Clearances, Job Functions, Local Privileges, Organization AffiliationsLocal Privileges, Organization Affiliations

Identity Provider, Service Provider and Identity Provider, Service Provider and User Credential Assertions (Metadata)User Credential Assertions (Metadata)

Communicate User’s Roles, Rights, Communicate User’s Roles, Rights, Privileges SecurelyPrivileges Securely

Standardized XML Credential Standardized XML Credential (Return)(Return)

Page 16: [PRESENTATION]

16

About JRAAbout JRA

Broad ScopeBroad Scope Cross AgenciesCross Agencies ScalableScalable Source AgnosticSource Agnostic DynamicDynamic Leverage Industry Leverage Industry

StandardsStandards SOA PhilosophySOA Philosophy Driven by Business Driven by Business

NeedNeed

Preserve Data AutonomyPreserve Data Autonomy Minimize DependenciesMinimize Dependencies Promote ReusabilityPromote Reusability Support Business AgilitySupport Business Agility Follow Iterative Follow Iterative

Development ApproachNDevelopment ApproachN Evolve IndefinitelyEvolve Indefinitely Build on OASIS ModelBuild on OASIS Model (Next)(Next)

Page 17: [PRESENTATION]

17

Key Elements of JRAKey Elements of JRA

RepositoryRepository Shared ServicesShared Services Service ProviderService Provider Service ConsumerService Consumer Service InterfacesService Interfaces Service Interaction ProfilesService Interaction Profiles Web ServicesWeb Services Messages Messages (Return)(Return)

Page 18: [PRESENTATION]

18

Suspicious Activity ReportingSuspicious Activity Reporting

SurveillanceSurveillance Photography of FacilitiesPhotography of Facilities Site BreachSite Breach Physical IntrusionPhysical Intrusion Cyber AttacksCyber Attacks Testing of Security Testing of Security (Return)(Return)

Page 19: [PRESENTATION]

19

Information Sharing Segment Information Sharing Segment Architecture (ISSA)Architecture (ISSA)

Intelligence OperationsIntelligence Operations InvestigationsInvestigations Law EnforcementLaw Enforcement Litigation and Judicial ActivitiesLitigation and Judicial Activities Correctional ActivitiesCorrectional Activities PrivacyPrivacy Security Security (Return)(Return)

Page 20: [PRESENTATION]

20

Regional Data Exchanges (R-DEx)Regional Data Exchanges (R-DEx)

Centerpiece of LEISPCenterpiece of LEISP Sharing of Federal Data on Regional Sharing of Federal Data on Regional

Basis (BOP, FBI, ATF, DEA, USMS)Basis (BOP, FBI, ATF, DEA, USMS) Key Participants: LA (Coplink), ARJIS, T-Key Participants: LA (Coplink), ARJIS, T-

DEx, Crime Matrix (Missouri), Linx DEx, Crime Matrix (Missouri), Linx (Seattle)(Seattle)

Open and Closed Case DataOpen and Closed Case Data Unstructured Data (unlike N-DEx) Unstructured Data (unlike N-DEx)

(Return)(Return)

Page 21: [PRESENTATION]

21

Law Enforcement ExchangesLaw Enforcement Exchanges(LEX 3.1)(LEX 3.1)

Used with N-DExUsed with N-DEx Interface Control DocumentInterface Control Document Flow Control through a special Flow Control through a special

approach to constructing IEPD’sapproach to constructing IEPD’s Enhanced Query ControlsEnhanced Query Controls Messaging Logic Built inMessaging Logic Built in Attachments (i.e. Mug Shots) Attachments (i.e. Mug Shots)

(Return)(Return)

Page 22: [PRESENTATION]

22

National Data Exchange (N-DEx)National Data Exchange (N-DEx)

Structured Data (unlike R-DEx)Structured Data (unlike R-DEx) Investigation ToolInvestigation Tool Incident Data (not Intelligence)Incident Data (not Intelligence) Incarceration and Probation/Parole DataIncarceration and Probation/Parole Data Skeleton Data to Repository for AnalysisSkeleton Data to Repository for Analysis Uses FBI CJIS WAN and LEOUses FBI CJIS WAN and LEO IJIS doing Cost Models for FBIIJIS doing Cost Models for FBI Governance by FBI CJIS Advisory Policy Governance by FBI CJIS Advisory Policy

Board (Return)Board (Return)

Page 23: [PRESENTATION]

23

NCIC PlansNCIC Plans

Process XML InProcess XML In Generate XML OutGenerate XML Out Use GJXDM/NIEM Naming and Design Use GJXDM/NIEM Naming and Design

Rules (NDR)Rules (NDR) Add to NIEM as needed via XSTFAdd to NIEM as needed via XSTF XML Representation of NCIC 2000 XML Representation of NCIC 2000

ElementsElements NLETS is Key Partner (Return)NLETS is Key Partner (Return)