Title: IDACS NCIC 2000
1IDACS / NCIC 2000
- Migration to the new System
- and Network.
2Introduction
- IDACS/NCIC 2000 Project Team
- Major Fred Pryor, ISP
- Dave Smith, IDACS/NCIC 2000 Project
Managerdsmith3_at_isp.state.in.us - Jim Cole, Datamaxx Project Manager
- Dennis Eaton, ISP Systems Programming / IDACS
ISO - Michael Paxton, ISP Systems Programming
- Matt Ryan, Intelenet Commissionmryan_at_intelenet.st
ate.in.us - Charlie Sharp, Intelenet Commissioncsharp_at_intelen
et.state.in.us
3System Overview
4Presentation Agenda
- IDACS Upgrade
- Project Status
- Network MIGRATION
- Workstations
- Datamaxx Workstation Client
- Network Overview
- System Security
- Interface specifications IDACS- Open FOX message
switch - Regional Systems, 3rd Party Vendor provided
systems (CAD, MDT, RMS etc.)
5Project Status
- Project Status
- 5 Phases contract execution, design,
development, deployment and acceptance. - Were in Phase II the most important of all
phases - Timeline remaining
- May 31 October 15
- Programming State Police Datamaxx/CPI Open
FOX - Network Upgrade through February 2004
- Implementation
- Deployment/installation of Workstation Clients
- Cutover to new IDACS System for Live Operation
6Network Migration
7Network Migration
- The Pressing Questions
- How do agencies and departments go about this
Migration? - What does that involve?
- What is it going to cost?
- How do I do it?..
8Network Migration
- How do agencies and departments go about this
migration? - IDACS - continued support of existing network for
2 years from March 1, 2002. - Requires a new telco managed circuit Replaces
your current IDACS circuit and modem - Intelenet Commission -
- Service of the Indiana Telecommunications Network
(ITN) - Partnership between the Intelenet Commission and
its business partners (ATT and Ihets). - Private Network, only serving the public sector.
Customers Include K-12, Higher Ed, State
Libraries, State Government.
9Network Migration
- Intelenet Commission contd
- 56 Kilobit Frame Relay Service includes
- 24 x 7 help desk support through ITN. Always on,
no dialing up required. - Router is included with the service.
- Guaranteed 32 Kilobit Committed Information Rate
(CIR) at all times.
10Network Migration
- What does that involve?
- Installation of new IDACS telco service
- Service will be ordered through the Intelenet
Commission. - All customer information will be taken at that
time. Allow a minimum of 40 days for the service
to be installed. - Installation will consist of the circuit install
(local telco), demarc extension, and router
install (ITN contractors). Up to three site
visits.
11Network Migration
- What is it going to cost?
- Monthly Recurring Cost (projected)
- The quicker the service is adopted by IDACS
users, the lower the MRC should be. Monthly
recurring cost will NOT exceed 500.00, however. - Non-Recurring Costs
- 1,500 Installation Charge.
- 435.00 Demarc Extension Charge (if required).
- Core or wall penetrations on a per quote basis.
12Network Migration
- How do I do it?
- Contact Information
- To order service/provisioning information
- Lynn Jefferson, Customer Service Specialist
(317) 234-1427.ljefferson_at_intelenet.state.in.us
- Questions/Comments regarding 56K frame service or
Intelenet/Indiana Telecommunications Network - Matt Ryan, Manager, Network Services (317)
233-8874.mryan_at_intelenet.state.in.us - Charlie Sharp, Director of Operations (317)
233-8997.csharp_at_intelenet.state.in.us
13Workstations
14Workstations
- What will work on the system?
- Time for a quick needs analysis
- What are you using today?
- What are you planning for the future? CAD, RMS,
mobile data devices? - IDACS NCIC 2000
- Standalone terminal agency can use
- Hardware/Operating System almost any Pentium
based PC,. Windows 95, 98, or Windows 2000.
(Windows 2000 Professional preferred operating
system, provides a better level of security.)
15Workstations
- Standalone terminal agency can usecontd
- Common off-the shelf getem at a local office
supply product Dell, Gateway, HP, NEC, with
a minimum - Pentium III / IV processor
- 128 MB RAM
- 20 G byte hard drive (standard minimum)
- 10/100 M Byte PCI Ethernet network card
- Monitors again, off the shelf - 15 21 .28
up to.24AG Trinitron Monitors, 15 flat panel
displays to the 19 Digital Flat Panel displays.. - Performance Considerations
- What else are you going to run on it ?!?!?
- Presentation later on the platform selected for
ISP use. Get some IDEAS!
16Network Overview
- ISP Systems and Programming
17Network Overview
18Network Overview
19Network Overview
20Network Overview
Diagram Here!.
21System Security
- IDACS Information Security Officer (ISO)
22System Security
- Site Security
- Site must have adequate physical security to
protect equipment and data. - Visitors must be accompanied by staff.
- Personnel restricted to authorized persons.
- Documented procedures to monitor security.
- Terminal use for authorized purposes.
- Procedures for changing of passwords.
23System Security
- Personnel
- Check state/national fugitive/arrest files.
- If record found, delay access pending further
review. - Felony/serious misdemeanors referred to CTA or
designee. - Notice to employer with disposition.
24System Security Technical
- Dial-up Access
- Properly managed ports and other security
measures. - Develop and maintain documentation of security
measures. - Identify and authenticate dial-in users.
- Transaction logs of activity.
- Each individual shall be uniquely identified.
(i.e. name, badge, serial, or other unique
number.) - CTA and Computer Center automated logging.
25System Security Technical
- Authentication Strategy
- Centralize oversight.
- Decentralize day-to-day and administration of
computer centers.
26System Security Technical
- Encryption
- Any use of a public network segment must be
encrypted. (includes wireless, dial-up, or
Internet). - session-based or VPNs.
- private-key (FIPS Publication 46-2).
- DES (ANSI X3.92, ANSI X3.106, FIPS Publication
81.) - FBI responsible for FBI to CTA.
- CTA responsible for CTA to Computer Centers.
27System Security Technical
- Encryption contd
- Ensure correct, legal, efficient dissemination
- Copies of III data must be secured.
- Audit considerations.
- CTA to document and oversee encryption key
management procedures.
28System Security Technical
- Internet
- advanced authentication.
- access control.
- integrity.
- confidentiality.
- non-repudiation.
- firewall protection.
29Interface Specifications
30Interface Specifications
- DMPP-2020 Communications Interface
- Provides
- Guaranteed delivery
- Application-level message headers
- Data-stream format communication
- DSEO-2020 Embedded Objects
- Provides
- Standard method of image exchange
- Platform independence
- Compatibility with DMPP-2020
31Next Steps
- When can I begin the process?
- budget issues are the driving force. I have
two years, but can I wait? Who else is on my
circuit that may leave potentially increasing
my line costs..? - Plan for your workstation.
- Plan for network upgrade
- initial contacts with Intelenet - circuit,
router installation- - Do I need the (IDACS software)?
- Will the IDACS staff be available for questions
or assistance?
32Datamaxx Client
- Datamaxx Prime Vendor
- Datamaxx a leader in criminal justice
information systems integration. - Desktop client application
- Contract 10,000 user licenses for the Datamaxx
client, OmniForce - No cost to the local agencies wishing to deploy
to their desktops. - Windows like look and feel. Not Windows
however - Demonstration
- Computer Projects, Inc. (CPI) Open Fox message
switching system (IDACS).
33Demonstrations
- IDACS Workstation
- State Police Districts / GHQ
- DATAMAXX Workstation Client
- OmniForce
34Datamaxx Demonstration
- Datamaxx Project Management
35Omniforce Client
- Fourth generation of software
- Not 1.uh-oh version
- Uses internet technology, but it is NOT a browser
- Industry-standard components
- All necessary modules download automatically
- Updates itself automatically
- Platform independent
- Windows 2000 Professional preferred
36The workstation client is automatically updated
with new forms each time the application is
started.
37The workstation client is shown below in its
initial state without any transaction forms or
windows open.
38 The forms menu provides access to all transaction
forms available to the user
39The menu panels will cascade as the user narrows
their selection from the choices available to
them.
40Selecting the appropriate transaction will close
the menu and open the desired transaction form.
Note default information is pre-loaded into
transaction fields.
41The user completes the transaction by entering
data into the transaction data fields
42For any field that is validated by a value list,
the user may access a list of field values by
clicking the value list control.
Field Value List Control
43After selecting a value from the list, the
correct data is inserted into the data field.
Note If the user knows the appropriate data
value for a field they may type it directly into
the field without using the data list.
44As the user enters data into the fields, the
system automatically checks to ensure that only
valid values are entered
45Entering an incorrect value into a field causes
an error dialog to be displayed.
Note The Error Dialog can be over ridden if the
value is correct, but has not been identified to
the system validation tables.
46After entering all available data, the user
transmits the transaction by clicking the
Transmit control.
Transmit Control
47The system does a final check to ensure that all
data fields are accurate and required fields
contain data.
48After all validation has been passed, the user
once again transmits the message to the network.
49After transmitting, the Message Window is opened
allowing the operator to review responses.
50Double-clicking any of the messages in the
Message Window will display the full content of
the message.
51Multiple Transaction Windows can be open at one
timeallowing the operator to work on several
activities.
52The Message Log utility allows the user to search
for and review any messages they have sent or
received.
53The workstation provides access to information
previously only available in printed format.
Help information may be maintained on
separate/disparate servers for ease of update.
54Training Certification
- Training
- Online
- Integrated companion software with Omniforce
- User configurable profile
- Remembers where user leaves off and resumes
- Certification
- Online
- Pooled questions
- Timed testing
- Immediate results and certification
- Integrated with Operator Authorization
55Training Certification
- Training
- Train the Trainer
- October 1 02
- User community workstation software installation
October 7 14
56IDACS/NCIC 2000