Title: Information Sharing and Other BJA Initiatives
1Information Sharing and Other BJA Initiatives
- NAJIS Conference
- September 22, 2006
2Presentation Structure
- BJA Overview
- Policy Issues
- BJA Initiatives
- Information Sharing Initiatives
- Training and Technical Assistance
- Funding Picture
3B J A Overview
4BJA Background
- A component of the Office of Justice Programs,
U.S. Department of Justice, which also includes - National Institute of Justice (NIJ)
- Office of Juvenile Justice and Delinquency
Prevention (OJJDP) - Office for Victims of Crime (OVC)
- Bureau of Justice Statistics (BJS)
5BJA Three Components
- Policy
- Programs
- Planning
- These components administer grant programs,
shape and promote sound justice policy, and plan
for fiscal and legislative changes affecting over
7,000 grants.
6BJAs Office of Policy
- Provides oversight and guidance to BJAs national
programs and services as well as innovative
regional and local efforts. - Develops leadership opportunities for BJA and its
partners in law enforcement and other criminal
justice components
7P O L I C Y I s s u e s
8Cutting Edge Policy Issues
- Methamphetamines
- Homicide Investigation/Clearance
- Law Enforcement Leadership Development
- Law Enforcement Safety (Traffic, Armor, etc)
- Witness/Victim Intimidation
- Criminal Intelligence/Counterterrorism
9Cutting Edge Policy Issues
- Court/Judicial Security
- Forensic Investigations/Cold Cases
- Intelligence Fusion Centers
- Less Lethal Law Enforcement Technology
- Counterterrorism Strategies
- Identity Theft Prevention/Training for LEOs
10Cutting Edge Policy Issues
- Street Gangs
- Sex Offender Monitoring/Management
- Auto Theft
- Human Trafficking
- Interoperability
- Information Sharing
11B J A I N I T I A T I V E S
12BJA Training initiatives
- SLATTState and Local Anti Terrorism Training
Program - CenTFCenter for Task Force Training
- 28 CFR part 23
- US DOJ Global XML
- Computer Investigations, Forensics, and
Intelligence Analysts
13State and Local Anti-Terrorism Training Program
(SLATT)
- A training and research program to provide
pre-incident awareness, prevention, and
interdiction training and information to state
and local law enforcement - Focus is on the detection, investigation, and
prosecution of extremist/terrorist-based crimes - Joint effort with the FBI
14 Center for Task Force Training (CenTF) Program
- Funded by the U.S. Department of Justice, Bureau
of Justice Assistance, since 1991 - Training focuses on multiagency narcotics
enforcement operations - Current course offerings
- Narcotics task force operation
- Methamphetamine investigation management
- Specialized training events
- Tribal methamphetamine investigation management
15 Criminal Intelligence for the Chief Executive
- Based on the law enforcement executive training
classification, specified in the National
Criminal Intelligence Sharing Plan - Focuses on criminal intelligence sharing, the
intelligence function, intelligence-led policing,
and legal and privacy issues - This course is critical to the development and/or
enhancement of an intelligence function within a
law enforcement agency, regardless of the
agencys size
16 Development of an Intelligence Commanders Course
- The focus of this course will be the intelligence
commander/supervisor of an agencys intelligence
unit - Objectives of the course will include
understanding the criminal intelligence process,
intelligence-led policing, and the role of the
commander/supervisor in enhancing public safety - A focus group is being held on August 22, 2006 to
begin the development of curriculum
1728 CFR Part 23Criminal Intelligence Systems
Operating Policies Training and Technical
Assistance
- Four-hour training that outlines 28 CFR Part 23,
a guideline for law enforcement agencies that
operate federally funded, multijurisdictional
criminal intelligence systemstraining topics
include - Overview of the regulation
- Complying with the regulation
- Storing criminal intelligence
- Inquiry and dissemination issues
- Review-and-purge process
18 Dealing with the Gang Problem
2005 National Gang Threat Assessment A
collaborative effort among federal, state, and
local law enforcement agencies to develop a
unique, multilevel perspective on the nations
gang problem.
19Preventing Gang Involvement in Elementary and
Middle School Youth
20National White Collar Crime Center (NW3C)
21Sharing Information and Intelligence within Law
Enforcement
NCIRC
22 RISS Geographical Regions
MOCIC Springfield, MO
NESPIN Franklin, MA
WSIN Sacramento, CA
MAGLOCLEN Newtown, PA
RMIN Phoenix, AZ
ROCIC Nashville, TN
23 RISS Overview
- Six information sharing intelligence centers
- As of June 30, 2004, over 7,000 municipal,
county, state, federal, and tribal law
enforcement agency members
24Only available through RISS and LEO
25INFORMATION SHARING INITIATIVES
26 Examples of BJA Information Sharing Projects
- 28 CFR Part 23
- Applying Security Practices
- CAD/RMS Functional Specs and IEPDs
- Capabilities Assessment Toolkit
- CISAnet
- Executive Intelligence Training
- Federated ID/Privilege Management
- Fusion Center Guidelines
- Gang Information Sharing Initiative
- GJXDM
- GJXDM Policy Academy
- GJXDM Tools (SSGT, Listserv, Bugzilla, etc.)
- GJXDM User's Conference/Implementer's
Course/Executive Briefing - GJXDM User's Guide
- IEPD Clearinghouse
- IEPD Guidelines
- Justice Reference Architecture
- Justice Resources CD
- Justice Standards Clearinghouse (JSC)
- Knowledgebase/Helpdesk
- NCISP
- NIEM
- NMVTIS
- NSOPR
- Pegasus
- Prescription Drug Monitoring Program
- Privacy Policy Development Guide
- Promoting SOA
- Regional Sharing Initiatives
- RISS
- SAVIN guidelines
- Technical Assistance
- Training and Outreach
27Justice Reference Architecture (JRA)
- Service orientation
- Open standards
- Supports implementation interoperability
- Supports state and local justice agency exchanges
- Partnership of government practitioners and
industry vendors (IJIS)
28Justice Reference Architecture Liaisons
- Coordinating with DOJ LEISP on FBI systems like
N-Dex. - Coordinating with DNI on Fusion Center exchanges.
- Tracking architecture work done by emergency
management groups. - Tracking HealthIT architecture.
29A Plug-and-Play Architecture
- Think about stereo connectors
- The reference architecture needs to be modular
- Cleanly separated components
- Substitutable components
- Rigorous technical standards are required to make
this a reality
30 The Modular Pieces
- Information Model
- Interchangeable vocabularies (GJXDM/NIEM, EDXL,
HL7) and exchange schemas (IEPDs) - Composable components to create new exchange
schemas quickly and easily - Service Interaction Profiles (messaging)
- Interchangeable profiles like Web services, MQ,
wireless, etc. - Composable micro-services to create new services
quickly and easily
31The National Criminal Intelligence Sharing Plan
(NCISP)
32 Fusion Centers
Guideline Development a phased approach
- Law Enforcement Intelligence
- Public Safety
- Private Sector
33 What Is a Fusion Center?
- A collaborative effort of two or more agencies
that provide resources, expertise, and/or
information to the center with the goal of
maximizing the ability to detect, prevent,
investigate, apprehend, and respond to criminal
and terrorist activity
34Why Is the Fusion Process Important?
- Supports an all-source, all-crimes, all-hazards,
all-threats approach to intelligence - Blends data from different sources, including law
enforcement, public safety, and the private
sector - Supports risk-based, information-driven
prevention, response, and consequence management
programs - Supports intelligence-led policing
- Fusion is the overarching process of managing the
flowing of information and intelligence across
all levels and sectors of government and the
private sector
35Privacy Policy Development Guide
- Geared toward the justice practitioner charged
with developing or revising an agencys privacy
policy - A practical, hands-on resource providing
sensible guidance to develop a privacy policy - This guide is the next logical step forthose
justice entities ready to move beyond awareness
to actual policy development process - It assists agencies in articulating privacy
obligations in a manner that protects the
justice agency, the individual, and the public
and makes it easier to do what is
necessaryshare critical justice information
36State Automated Victim Notification (SAVIN)
37Computer Aided Dispatch and Records Management
Systems(Functional and Technical Standards)
38Justice Information Exchange Model(SEARCH)
39National Sex Offender Public Registry
40The Design
- Distributed model
- Service Oriented Architecture
- Web Services
- US DOJ XML
- National search engine, local control
The Results
- Connected 22 sites in 60 days
- Connected additional 28 sites in 5 months
- Over 27 million hits in first 48 hours
- Peeked at 977 hits per second
- After 43 weeks over 349 million hits
41National Sex Offender Public Registry
42Average hits per day
Week ending 4/16/06
Week ending 8/21/05
Week ending 11/20/05
43 How the site is being used
- RI, KY, and TX used the site to check evacuees
from LA and MS. - H.R. 3402 requires International Marriage Brokers
to check all their clients against NSOPR or the
state sites - Department of State has recommended the residents
of a home taking in a foreign exchange student
44Next phases
- Connect US Territories and Tribal agencies
- Create zip code radius search
- Review mapping capabilities
- Bring states together to identify needs
Future plans
- Provide plug ins for states
- Mapping
- E-mail notification
- Create communication network
- SOR management
- Sex offender management
- Meet needs to access information in other ways
45G J X D M
N I E M
46What is the GJXDM?
- common vocabulary for exchanging information
between justice information systems - An object-oriented structure for defining
relationships between data elements - A reference for standardizing code table values
from authoritative sources (e.g. NCIC) - A methodology for creating electronic versions of
documents to be exchanged
47How does it work?
Implement system
Define Exchanges
Create document schema
Validate Against GJXDM
Determine data to be included
Register in repository
Sub-schema Generator tool
JIEM Modeling tool
48 Origin of NIEM
- NIEM was launched on February 28, 2005, through a
partnership agreement between the U.S. Department
of Justice (DOJ) and the U.S. Department of
Homeland Security (DHS)
49 What is NIEM?
- Vision
- Become the Standard, by Choice, for Government
Information Exchange - Local / State / Tribal / Federal
- Business Driven Focus
- NIEM works by modeling exchanges in business
context - NIEM leverages precise vocabularies managed by
Communities of Interest - NIEM enables standards for national priority
Information Exchanges
50Built on the Global JXDM
- The Global Justice XML Data Model (Global JXDM)
has - A robust, mature framework that is rich,
flexible, and extensible - An effective governance mechanism
- NIEM builds on the demonstrated success of the
Global JXDM - NIEM was based on the Global JXDM
- The Global JXDM will form the justice domain of
NIEM (the jxdm namespace) - The XSTF will continue to represent the Global
JXDM within NIEM - This body will potentially serve as a model for
other NIEM domains
51 NIEM Characteristics
- Information Model
- Based on Open Standards
- Information Exchange Packages (IEPDs)
- Tools
- Graphical Browser
- Schema Subset Generator (SSGT)
- IEPD Tool (Interim Repository)
52 Web Site Activity
- Average hits / day
- 1,842 pre-beta
- 6,689 currently
- Average downloads / day
- 11 pre-beta
- 97 currently
- Average viewing time
- 17 minutes pre-beta
- 29 minutes currently
- Web site activity for the period from June 1,
2006 to July 27, 2006. - Averages exclude the abnormal activity on July
17th and 18th. - 2,881 downloads of the release package and
242,414 hits. - Downloads refer to the 0.3 and 1.0 Beta 1
release packages.
53 Information Exchange Standards Targeted
- GJXDM IEPDs
- (DOJ) Incident Reporting Fusion Center
Integration - (DOJ) Case Management
- (DNI) Terrorist Watch List
- (DNI) Suspicious Activity Reporting
- (DHS) People Screening
- (DHS) Cargo Screening
- (DHS) Emergency Management / Disaster Management
- (DHS) Infrastructure Protection
54 NIEM Web Site
- Home Page (www.niem.gov)
- Documentation
- Executive Brief
- Introduction to NIEM
- IEPD Requirements
- Concept of Operations (under development)
- Users Manual (under development)
- Tools (http//www.niem.gov/tools.php)
- Graphical model browser
- Model subset generation
- Information Exchange Package Description (IEPD)
- Other Capabilities
- FAQs
- Downloads
- News / Events (coming)
55Organization Model External View
56 NIEM Architecture
Data component - fundamental building block of
NIEM. Data components are the basic business data
items that describe common concepts used in
general business activities Universal components
- Data components (within an information
exchange) commonly shared and understood among
all domains (e.g., person, address and
organization) Common components - Data
components used in exchanges between multiple
domains, but not universally shared (e.g.,
offense, sentence, and disposition)
Domain-Specific - Components managed by a
specific Community of Interest
57 Capabilities
- Documentation
- Introduction to NIEM
- Concept of Operations
- User Guide
- NIEM Naming and Design Rules
- Standards
- IEPD requirements specs
- Training and Technical
- NIEM website
- Training materials
- Help desk
- Tools
- Component Mapping Template
- Schema Sub Generation Tool
- Graphical Browser
- IEPD Clearinghouse
- Governance and Processes
- The structure to manage and maintain
- NIEM and its processes and procedures.
58(No Transcript)
59 Training and Technical
60Tools
61 Graphical Browser
62Schema Subset Generation Tool
63 IEPD Tool
64(No Transcript)
65 Next Steps
- NIEM 1.0 Release Candidate in October
- Scale Up Governance Activities
- Catalyze Conversion of GJXDM IEPDs by
Authoritative - 54 IEPDs in OJP IEPD Clearinghouse
(http//it.ojp.gov/iepd/) - PM-ISE national priority target outcomes
- Counter-Terrorism Information Sharing Standards
- Technical support
- Help desk
- Expand FAQ topics
- Develop NIEM training materials
- Expand communications and outreach efforts
- Within existing COIs
- Follow adoption to new domains and COIs
- Executive, legislative, and judicial branches at
the State, Local, Tribal and Federal levels
66 - For more information visit the NIEM web site
(http//www.niem.gov) - Contact NIEM by email at information_at_niem.gov
67Training and Tecnical Assistance
68 Types of Training and Technical Assistance (TTA)
- Team building and collaboration
- Community partnership development
- Staff development
- Resource identification and management
- Information management
- Program evaluation
- Problem assessment
- Strategic planning and development
- Program sustainability
- Cutting-edge practice (s) documentation and
identification - Evidence-based practice (s) identification and
development
69Supporting state, local, and tribal through
- Onsite technical assistance
- Offsite technical assistance (via telephone,
e-mail, Internet, distance learning, etc.) - Peer-to-peer information exchange and mentoring
(individual, group, or jurisdiction wide) - Publication drafting and dissemination
- Information sharing
- Conferences, workshop, and training events
(agenda development, speaker identification, and
logistical support) - Curriculum development
- GTTAC GJXDM Training and Technical Assistance
Committee
70http//it.ojp.gov/topic.jsp?topic_id192
71 Eligibility
- Any state, tribal, or local agency, or
organization involved in activities related to
fighting crime or ensuring public safety may
request TTA from BJA. - While BJA may not have funding available for a
specific purpose, we may be able to assist
jurisdictions in identifying other resources to
meet a need. - BJA will entertain all TTA requests related to
public safety and will make every effort to
identify avenues of assistance when possible.
72RESOURCES
73 BJA Resource CD
74 Products on CD
- Security Practices
- Service Oriented Architecture
- Fusion Center Guidelines
- IEPD Guidelines
- Law Enforcement Analytic Guidelines
- Criminal Intelligence Training Standards
- National Criminal Intelligence Sharing Plan
- Privacy Policy Development Guide
- Setting up Wi-Fi
- Web Services Security Issues
75 Other Products
- Case Management System Functional Specs (NCSC)
- Corrections Functional Specs (CTA)
- Probation/Parole Functional Specs (APPA)
- CAD/RMS Functional Specs (LEITSC)
- Court Model RFP (NCSC)
- E-Filing Standards (NCSC)
76 Resources on CD
- CTG
- Business Cases
- Capability Assessment Tool
- SEARCH
- GJXDM Users Guide
- Governance Document
- Decision-Making Document
- JIEM Documentation
- UNO
- Inadequate Funding Consequences
- NASCIO
- IJIS Concept of Operations
- Enterprise Architecture Toolkit v3.0
- NGA
- Information Sharing
- State Investment Strategies
- NCSL
- Integrated Justice Information Sharing
- Funding Justice Information Sharing
77Resources on CD (Continued)
- IJIS Institute
- Information Security Primer
- Technology Considerations for Integrated Justice
Information Systems - International Association of Chiefs of Police
- Criminal Intelligence Policy
- Strategic Planning
- BJA
- Resource Directory
78Other Resources (Not on CD)
- Excellent Series of COPS Documents
- Technology
- Interoperability
- Wireless Communications
- NCJA
- Privacy Documentation (Baseline Info)
- Governance at State Level (Cases)
79Success Stories (on CD)
- Grant Program Success Stories (States)
- GJXDM Success Stories
- J-NET Case Studies
80Monographs (on CD)
- Governance Structures (Local Government)
- Mutual Aid
- Intelligence Led Policing
- Private Sector Partnerships
- Managing the Terrorism Threat
81BJA Regional Information Sharing Conferences
- Being presented in conjunction with SEARCH
- 2 ½ days to discuss information sharing at
executive, manager, and implementer levels - Locations
- September 25-27, Jacksonville, FL
- November 28-30, San Diego, CA
- February 6-8, 2007, Houston, TX
- March 27-29, 2007 Minneapolis, MN
82What Resources Have Been Compiled for Fusion
Centers?
- The Fusion Center Guidelines report
- CD contains
- sample policies
- Templates
- Checklists
- resource documents
- Second generation will be ready for release
shortly
83BJA-DHS Regional Fusion Center Meetings
- Four regional meetings of Fusion Center managers
- Information will be taken to develop a national
meeting sponsored by DHS - Meeting locations
- Northeastern August 9-10, Philadelphia, PA
- Southeastern August 28-29, Nashville, TN
- Midwestern September 19-20, St. Louis, MO
- Western October 24-25, Denver, CO
84IJIS Institute
- Training and Technical Assistance
- Help Desk (Knowledgeware)
- Statewide Automated Victim Notification (SAVIN)
Program - Prescription Drug Monitoring Program (PDMP)
- GJXDM Training
- IEPD Clearinghouse
- Integration of Transportation and GJXDM
Standards
85http//www.it.ojp.gov/jsr
86http//it.ojp.gov/iepd/
87Funding Picture
88Overall Funding Trends, BJA
89BJA - FY 2006 Funding, by category
90Crime Prevention 71M
- USA Freedom Corps
- Project Safe Neighborhoods
- Project Child Safe
- Gang Resistance Education Training (G.R.E.A.T)
- Law Enforcement and Youth Partnerships for Crime
Prevention - Identify Theft
- National Citizens Crime Prevention Campaign
- Byrne JAG Grant Programs
91Law Enforcement 807M
- Bulletproof Vest Partnership Program
- Less-Lethal Technology
- National Forensic Academy
- National White Collar Crime Center
- Center for Task Force Training Program (CenTF)
- Homicide Investigation Standards
- Smaller Police Departments (IACP)
- Hurricane Katrina Recovery Efforts
- Public Safety Officers Benefits Program
- Public Safety Officer Medal of Valor
- Victims of Human Trafficking
- Byrne JAG Grant Program
92Counter-Terrorism 19M
- State and Local Anti-Terrorism Training Program
(SLATT) 100 Events 9,000 Officers Trained - Law Enforcement in the Post 9/11 Era
- Other Counter-Terrorism Projects
- Counter-Terrorism Working Group
- Counter-Terrorism and Resources for Law
Enforcement
93Adjudication 64M
- Mental Health Courts
- Tribal Courts Assistance Program
- Tribal Justice Gathering and Listening
Conferences - Southwest Border Prosecution Initiative
- Telemarketing Fraud Technical Assistance
- Community Justice and Courts
- Community Prosecution (Prevention Reentry)
- Judicial Training
- Closed Circuit Televising Program
- Urban Court Managers Network
- Capital Litigation Initiative
- Byrne JAG Grant Program
94Substance Abuse 104M
- Drug Court Discretionary Grant Program
- Indian Alcohol and Substance Abuse Program
- Harold Rogers Prescription Drug Monitoring
Program (PDMP) - Combating Methamphetamine Use
- Residential Substance Abuse Treatment for State
Prisoners Formula Grant Program (RSAT) - Byrne JAG Grant Program
95Corrections 369M
- Serious and Violent Offender Reentry Initiative
- Presidents Prisoner Reentry Initiative
- Comprehensive Approaches to Sex Offender
Management Discretionary Grant Pgm - State Criminal Alien Assistance Program (SCAAP)
- Other BJA funded Corrections Projects and
Partnerships (Electronic Supervision, Prison
Industries, Rural Needs, Rural Probation
Training, Sentencing Options, etc.) - Correctional Facilities on Tribal Lands Program
- Byrne JAG Grant Program
96Justice Information Sharing 77M
- Global Justice Initiative (Infrastructure/Standard
s, Intelligence, Privacy, Security) - National Sex Offender Public Registry
- National Criminal Intelligence Sharing Plan
- IJIS Institute
- Law Enforcement I.T. Standards Council
- NASCIO
- NGA Center for Best Practices
- SEARCH
- Regional Information Sharing Systems (RISS)
- National White Collar Crime Center (NW3C)
- Criminal Intelligence
- Byrne JAG Grant Program
97 JAG Justice Assistance Grant
- Proposed to streamline justice funding and grant
administration, the Edward Byrne Memorial
Justice - Assistance Grant (JAG) Program (42 U.S.C.
3750)Allows states, tribes, and local
governments to support a broad range of
activities to prevent and control crime based on
their own local needs and conditions. - JAG blends the previous Byrne Formula and Local
Law Enforcement Block Grant (LLEBG) Programs to
provide agencies with the flexibility to
prioritize and place justice funds where they are
needed most.
98Purpose Areas
- JAG funds can be used for state and local
initiatives, technical assistance, training,
personnel, equipment, supplies, contractual
support, and information systems for criminal
justice for any one or more of the following
purpose areas - Law enforcement programs
- Prosecution and court programs
- Prevention and education programs
- Corrections and community corrections
programs - Drug treatment programs
- Planning, evaluation, and technology
improvement - programs
- Any law enforcement or justice initiative
previously eligible for funding under Byrne or
LLEBG is eligible for JAG funding.
99Byrne-JAG Formula Discretionary
100Office of Justice Programs
- Upgrading Criminal History Program (NCHIP)
- Residential Substance Abuse Treatment (RSAT)
- Regional Information Sharing Systems (RISS)
- State Criminal Alien Assistance Program
- (SCAAP)
- Juvenile Justice Programs
- Office on Violence Against Women Programs
101National Criminal History Improvement Programs
(NCHIP)
102Residential Substance Abuse Treatment (RSAT)
103Regional Information Sharing System (RISS)
104State Criminal Alien Assistance Program (SCAAP)
105Crime Information Technology Act (CITA) Program
106Juvenile Justice Programs
- FY 03 264.3M
- FY 04 352.7M
- FY 05 379M
- FY 06 342.7M
- FY 07 Pres Request
- 189.6
- FY 07 House 285
- FY 07 Senate 301.5
107Office on Violence Against Women (OVW)
108COPS
109Law Enforcement Information Technology
110State Homeland Security Grant
111Urban Area Security Initiative (UASI)
112Law Enforcement Terrorism Prevention Program
(LETPP)
113Where We Are
- Justice Assistance
- House passed appropriations bill
- Senate passed appropriations bill
- Homeland Security
- House passed appropriations bill
- Senate passed appropriations bill
- Senate appointed members of conference committee
114http//www.ojp.usdoj.gov/funding/
115http//www.grants.gov
116http//www.ojp.usdoj.gov/BJA/
117 Ken Nicolas, Executive Director Office of the
Governor Criminal Justice Division Judy Switzer,
Program Director (512) 463-7879
http//www.ojp.usdoj.gov/saa/index.htm
118Steps Before Seeking Funding
- Identify the participants/partners
- Inventory of software/hardware
- Identify a clear mission
- What you want to do
- How youd like to do it
- Have a clear written plan
- Create an advisory committee
- Begin meeting
- Reach common ground
- Create/sign MOU/MOA with partners
- Implement standards
119The must have
- Executive Summary
- NO MORE than 2 ½ pages
- The problem
- The solution (include methodology)
- The time
- The cost
- The elevator speech
- Ability to clearly state the project in a short
amount of time - Convey the value not only to you, but the masses
(including that person) - Strong strategic champion
120Why programs dont get funded
- Not meeting the guidelines
- No clear mission or description of project
- Failure to answer questions
- Roles of partners not defined
- Required partners not identified
- Failure to follow directions
- Length/spacing
- Number of copies
- Binding
- Attachments
- Deadline
- Grant history
- No performance measures
121Bob GreevesPolicy AdvisorJustice Information
SharingDOJ/OJP/BJA
Thank you
- Robert.E.Greeves_at_usdoj.gov
- 202-305-9317