[presentation]
TRANSCRIPT
1
BJA Update:BJA Update:Information Sharing Information Sharing
InitiativesInitiatives
NAJIS 2007 ConferenceNAJIS 2007 Conference
October 17, 2007October 17, 2007
2
Information Sharing InitiativesInformation Sharing Initiatives Global InitiativesGlobal Initiatives
National Information Exchange Model National Information Exchange Model (NIEM)(NIEM) Global Federated Identity and Privilege Global Federated Identity and Privilege
Management Management (GFIPM)(GFIPM) Justice Reference Architecture/Service Oriented Justice Reference Architecture/Service Oriented
Architecture Architecture (JRA/SOA)(JRA/SOA)
National Information Sharing Environment National Information Sharing Environment (ISE)(ISE) Program Manager – Information Sharing Program Manager – Information Sharing
Environment (PM-ISE)Environment (PM-ISE) Fusion Centers (Public Law 110-53 of 3 Aug 2007)Fusion Centers (Public Law 110-53 of 3 Aug 2007) Suspicious Activity Reporting (SAR)Suspicious Activity Reporting (SAR)
3
Information Sharing InitiativesInformation Sharing Initiatives
Justice Oriented Architecture InitiativesJustice Oriented Architecture Initiatives JRA/SOA and Shared ServicesJRA/SOA and Shared Services DOJ Information Sharing Segment Architecture DOJ Information Sharing Segment Architecture
(ISSA)(ISSA)
ONE DOJ InitiativeONE DOJ Initiative Law Enforcement Information Sharing Program Law Enforcement Information Sharing Program
(LEISP)(LEISP) Regional Data Exchange (R-DEx)Regional Data Exchange (R-DEx) Law Enforcement Sharing Program Exchange Law Enforcement Sharing Program Exchange
Specifications (LEX 3.1)Specifications (LEX 3.1)
4
Information Sharing InitiativesInformation Sharing Initiatives
FBI InitiativesFBI Initiatives National Data Exchange (N-DEx)National Data Exchange (N-DEx) National Crime Information Center (NCIC) XML PlansNational Crime Information Center (NCIC) XML Plans
PrivacyPrivacy Policy Development Guide and Implementation Policy Development Guide and Implementation
TemplatesTemplates Training and Technical Assistance SupportTraining and Technical Assistance Support Technical Framework for Implementing Privacy Technical Framework for Implementing Privacy
PolicyPolicy Information Quality InitiativeInformation Quality Initiative Support to Federal Sector (PM-ISE)Support to Federal Sector (PM-ISE)
5
Information Sharing InitiativesInformation Sharing Initiatives
Other BJA Sponsored InitiativesOther BJA Sponsored Initiatives National Motor Vehicle Title Information National Motor Vehicle Title Information
System (NMVTIS) – currently 20 statesSystem (NMVTIS) – currently 20 states Prescription Drug Monitoring Programs (PDMP)Prescription Drug Monitoring Programs (PDMP) State-Wide Automated Victim Information and State-Wide Automated Victim Information and
Notification (SAVIN) ProgramNotification (SAVIN) Program Public Safety Interoperability Project Public Safety Interoperability Project
(IJIS/APCO)(IJIS/APCO) Intelligent Transportation Systems Public Intelligent Transportation Systems Public
Safety Program – IEEE/NIEM IntegrationSafety Program – IEEE/NIEM Integration Dru Sjodin National Sex Offender Public Dru Sjodin National Sex Offender Public
Registry (NSOPR)Registry (NSOPR)
6
IJIS Institute Support ActivitiesIJIS Institute Support Activities
Training and Training and Technical AssistanceTechnical Assistance
NIEM Help DeskNIEM Help Desk APCO CollaborationAPCO Collaboration Fusion Center Fusion Center
SupportSupport N-DEx SupportN-DEx Support National Training National Training
SeminarsSeminars Global CommitteesGlobal Committees
SAVINSAVIN PDMPPDMP ITS/Public Safety ITS/Public Safety
(IEEE Link)(IEEE Link) CAD/RMSCAD/RMS Emerging Emerging
TechnologiesTechnologies Security and PrivacySecurity and Privacy NIMSNIMS
7
Information Sharing InitiativesInformation Sharing Initiatives
Homeland Security Information Homeland Security Information Exchange Packages (IEPD’s) – Exchange Packages (IEPD’s) – Approximately 40Approximately 40 Hospital Availability Exchange (HAvE)Hospital Availability Exchange (HAvE) Customs and Border Protection (CBP)Customs and Border Protection (CBP)
6 IEPD’s Under Development6 IEPD’s Under Development Citizenship and Immigration Services (CIS) – Citizenship and Immigration Services (CIS) –
Federated Person QueryFederated Person Query Transportation Security Administration (TSA)Transportation Security Administration (TSA)
Alerts and Warnings IEPD’sAlerts and Warnings IEPD’s
8
Information Sharing InitiativesInformation Sharing Initiatives
Homeland Security Information Homeland Security Information Exchange Packages (IEPD’s) – Exchange Packages (IEPD’s) – ContinuedContinued Federal Emergency Management Federal Emergency Management
Administration (FEMA) - 2 IEPD’s Administration (FEMA) - 2 IEPD’s Focusing on Exercise SchedulingFocusing on Exercise Scheduling
Immigration and Customs Enforcement Immigration and Customs Enforcement (ICE)(ICE)
Person Query IEPD’s focused on Removable Person Query IEPD’s focused on Removable Aliens and Student Visa’sAliens and Student Visa’s
9
Information Sharing InitiativesInformation Sharing Initiatives
Homeland Security Information Homeland Security Information Exchange Packages (IEPD’s) – Exchange Packages (IEPD’s) – ContinuedContinued National Protection and Programs National Protection and Programs
Directorate (NPPD)Directorate (NPPD) Geospatial Emphasis on Infrastructure Geospatial Emphasis on Infrastructure
ProtectionProtection Integrated Common Analytical Viewer (iCAV) Integrated Common Analytical Viewer (iCAV)
to provide geo-location focus for natural and to provide geo-location focus for natural and man-made disastersman-made disasters
U.S. Visit – 4 IEPD’s Tracking Biometrics U.S. Visit – 4 IEPD’s Tracking Biometrics for non-U.S. Citizensfor non-U.S. Citizens
10
Information Sharing InitiativesInformation Sharing Initiatives
Homeland Security Information Exchange Homeland Security Information Exchange Packages (IEPD’s) – ContinuedPackages (IEPD’s) – Continued Office of Science and Technology (OS&T)Office of Science and Technology (OS&T)
Emergency Data Exchange Language (EDXL) and Emergency Data Exchange Language (EDXL) and Common Alerting Protocol (CAP) Standards (OASIS Common Alerting Protocol (CAP) Standards (OASIS Standards)Standards)
First Responder CredentialingFirst Responder Credentialing National Incident Management System (NIMS) National Incident Management System (NIMS)
Reference IEPDReference IEPD Situation Reporting IEPDSituation Reporting IEPD
Coast Guard – Ships Automated Information Coast Guard – Ships Automated Information System (AIS)System (AIS)
11
State and Local InitiativesState and Local Initiatives
Ohio (RMS)Ohio (RMS) New YorkNew York Minnesota (SOA)Minnesota (SOA) Virginia (VCIN)Virginia (VCIN) WisconsinWisconsin
CDCLCDCL Gateway SOAGateway SOA Warrant/Protection Warrant/Protection
OrdersOrders Washington Washington
(SOA/NIEM)(SOA/NIEM)
Maine (JRA)Maine (JRA) Pennsylvania Counties Pennsylvania Counties
(BPMN)(BPMN) Seattle (SeaJIS)Seattle (SeaJIS) Massachusetts (Public Massachusetts (Public
Safety Warehouse)Safety Warehouse) NLETSNLETS
CHIEF ProjectCHIEF Project Photo SharingPhoto Sharing
12
Bob GreevesBob Greeves
Bureau of Justice AssistanceBureau of Justice Assistance
www.it.ojp.govwww.it.ojp.gov
Email: Email: [email protected]@usdoj.gov
Phone:Phone:
(202) 305-9317(202) 305-9317
13
End of Presentation CoreEnd of Presentation Core
14
About NIEMAbout NIEM
July 31 2.0 ReleaseJuly 31 2.0 Release Wide Scale Wide Scale
AdoptionAdoption GJXDM Integration GJXDM Integration
(XSTF Continues)(XSTF Continues) Domain Version Domain Version
IndependenceIndependence Special Conditions Special Conditions
on Grantson Grants Migration Support Migration Support
ToolsTools
Training and T.A. Training and T.A. AvailableAvailable
Building Repository Building Repository of IEPD’sof IEPD’s
Many NIEM Many NIEM Documents AvailableDocuments Available
Help Help Desk/Knowledge Desk/Knowledge CenterCenter
Sign up for NIEM Sign up for NIEM News News (Return) (Return)
15
About GFIPMAbout GFIPM Global Federated Identity and Privilege Global Federated Identity and Privilege
Management (GFIPM)Management (GFIPM) Authentication (Identification)Authentication (Identification) Authorization (Privilege Management) – Authorization (Privilege Management) –
Certifications, Clearances, Job Functions, Certifications, Clearances, Job Functions, Local Privileges, Organization AffiliationsLocal Privileges, Organization Affiliations
Identity Provider, Service Provider and Identity Provider, Service Provider and User Credential Assertions (Metadata)User Credential Assertions (Metadata)
Communicate User’s Roles, Rights, Communicate User’s Roles, Rights, Privileges SecurelyPrivileges Securely
Standardized XML Credential Standardized XML Credential (Return)(Return)
16
About JRAAbout JRA
Broad ScopeBroad Scope Cross AgenciesCross Agencies ScalableScalable Source AgnosticSource Agnostic DynamicDynamic Leverage Industry Leverage Industry
StandardsStandards SOA PhilosophySOA Philosophy Driven by Business Driven by Business
NeedNeed
Preserve Data AutonomyPreserve Data Autonomy Minimize DependenciesMinimize Dependencies Promote ReusabilityPromote Reusability Support Business AgilitySupport Business Agility Follow Iterative Follow Iterative
Development ApproachNDevelopment ApproachN Evolve IndefinitelyEvolve Indefinitely Build on OASIS ModelBuild on OASIS Model (Next)(Next)
17
Key Elements of JRAKey Elements of JRA
RepositoryRepository Shared ServicesShared Services Service ProviderService Provider Service ConsumerService Consumer Service InterfacesService Interfaces Service Interaction ProfilesService Interaction Profiles Web ServicesWeb Services Messages Messages (Return)(Return)
18
Suspicious Activity ReportingSuspicious Activity Reporting
SurveillanceSurveillance Photography of FacilitiesPhotography of Facilities Site BreachSite Breach Physical IntrusionPhysical Intrusion Cyber AttacksCyber Attacks Testing of Security Testing of Security (Return)(Return)
19
Information Sharing Segment Information Sharing Segment Architecture (ISSA)Architecture (ISSA)
Intelligence OperationsIntelligence Operations InvestigationsInvestigations Law EnforcementLaw Enforcement Litigation and Judicial ActivitiesLitigation and Judicial Activities Correctional ActivitiesCorrectional Activities PrivacyPrivacy Security Security (Return)(Return)
20
Regional Data Exchanges (R-DEx)Regional Data Exchanges (R-DEx)
Centerpiece of LEISPCenterpiece of LEISP Sharing of Federal Data on Regional Sharing of Federal Data on Regional
Basis (BOP, FBI, ATF, DEA, USMS)Basis (BOP, FBI, ATF, DEA, USMS) Key Participants: LA (Coplink), ARJIS, T-Key Participants: LA (Coplink), ARJIS, T-
DEx, Crime Matrix (Missouri), Linx DEx, Crime Matrix (Missouri), Linx (Seattle)(Seattle)
Open and Closed Case DataOpen and Closed Case Data Unstructured Data (unlike N-DEx) Unstructured Data (unlike N-DEx)
(Return)(Return)
21
Law Enforcement ExchangesLaw Enforcement Exchanges(LEX 3.1)(LEX 3.1)
Used with N-DExUsed with N-DEx Interface Control DocumentInterface Control Document Flow Control through a special Flow Control through a special
approach to constructing IEPD’sapproach to constructing IEPD’s Enhanced Query ControlsEnhanced Query Controls Messaging Logic Built inMessaging Logic Built in Attachments (i.e. Mug Shots) Attachments (i.e. Mug Shots)
(Return)(Return)
22
National Data Exchange (N-DEx)National Data Exchange (N-DEx)
Structured Data (unlike R-DEx)Structured Data (unlike R-DEx) Investigation ToolInvestigation Tool Incident Data (not Intelligence)Incident Data (not Intelligence) Incarceration and Probation/Parole DataIncarceration and Probation/Parole Data Skeleton Data to Repository for AnalysisSkeleton Data to Repository for Analysis Uses FBI CJIS WAN and LEOUses FBI CJIS WAN and LEO IJIS doing Cost Models for FBIIJIS doing Cost Models for FBI Governance by FBI CJIS Advisory Policy Governance by FBI CJIS Advisory Policy
Board (Return)Board (Return)
23
NCIC PlansNCIC Plans
Process XML InProcess XML In Generate XML OutGenerate XML Out Use GJXDM/NIEM Naming and Design Use GJXDM/NIEM Naming and Design
Rules (NDR)Rules (NDR) Add to NIEM as needed via XSTFAdd to NIEM as needed via XSTF XML Representation of NCIC 2000 XML Representation of NCIC 2000
ElementsElements NLETS is Key Partner (Return)NLETS is Key Partner (Return)