58
1

"Weaving Your Way Through the Web of Technology Conference 2008"

  • Upload
    mike97

  • View
    503

  • Download
    1

Embed Size (px)

Citation preview

Page 1: "Weaving Your Way Through the Web of Technology Conference 2008"

1

Page 2: "Weaving Your Way Through the Web of Technology Conference 2008"
Page 3: "Weaving Your Way Through the Web of Technology Conference 2008"

Federal Appropriations Process Timeline

September February March-April May June-October

Federal agencies submit funding requests to OMB 2 years out. (e.g., In 2007, agencies submit requests for 2009.)

President submits his budget proposal to Congress. House and Senate budget committees each formulate a budget resolution. 

House and Senate floors vote on their respective budget resolutions. Leading budget committee members from both chambers develop an agreement on the budget resolution. Both Houses vote on the agreed budget resolution. Budget resolution is reached.

House and Senate appropriations subcommittees develop appropriations bills. Appropriations subcommittees report bills to appropriations committees.

House and Senate appropriations committees mark up appropriations bills. House and Senate floors vote on their respective appropriations bills.

Leading appropriations committee members from both chambers reach a consensus on the appropriations bills, called a conference report.  House and Senate floors vote on appropriations conference report. Appropriations bill sent to the President. President signs or vetoes bill. Congress passes continuing resolution if President does not sign bill by Oct. 1.

Page 4: "Weaving Your Way Through the Web of Technology Conference 2008"
Page 5: "Weaving Your Way Through the Web of Technology Conference 2008"

Overall Funding Trends, BJA

Page 6: "Weaving Your Way Through the Web of Technology Conference 2008"

Distribution of FY2008 Funding

$179,833,000

$482,613,000

$468,930,000

$74,834,000

Formula Discretionry Reimbursement Payments

Page 7: "Weaving Your Way Through the Web of Technology Conference 2008"

FY 2008 Funding Levels(By category)

Crime Prevention

Law Enforcement

Adjudication

Substance Abuse

Corrections

Information Sharing

DiscretionaryEarmarksPresidentialConvention Security

$209,033,901; 19%

47,636,667; 4%

$100,000,000; 9%

$187,513,000; 17%

$31,466,667; 3%

$53,946,665; 5%

$443,708,667; 39%

$39,496,667; 4%

Page 8: "Weaving Your Way Through the Web of Technology Conference 2008"

Byrne Competitive Grant Program

$0$20,000,000$40,000,000$60,000,000$80,000,000

$100,000,000$120,000,000$140,000,000$160,000,000$180,000,000$200,000,000

Page 9: "Weaving Your Way Through the Web of Technology Conference 2008"

Byrne Discretionary Grant Program (Earmarks)

$0$20,000,000$40,000,000$60,000,000$80,000,000

$100,000,000$120,000,000$140,000,000$160,000,000$180,000,000$200,000,000

Page 10: "Weaving Your Way Through the Web of Technology Conference 2008"

Justice Assistance Grant Program

$0

$100,000,000

$200,000,000

$300,000,000

$400,000,000

$500,000,000

$600,000,000

$700,000,000

Page 11: "Weaving Your Way Through the Web of Technology Conference 2008"

Bulletproof Vests

$22,000,000

$23,000,000

$24,000,000

$25,000,000

$26,000,000

$27,000,000

$28,000,000

$29,000,000

$30,000,000

Page 12: "Weaving Your Way Through the Web of Technology Conference 2008"

Capital Litigation

$0

$500,000

$1,000,000

$1,500,000

$2,000,000

$2,500,000

Page 13: "Weaving Your Way Through the Web of Technology Conference 2008"

Gang Prevention

$0

$5,000,000

$10,000,000

$15,000,000

$20,000,000

$25,000,000

$30,000,000

$35,000,000

$40,000,000

$45,000,000

Page 14: "Weaving Your Way Through the Web of Technology Conference 2008"

Offender Reentry

$0

$5,000,000

$10,000,000

$15,000,000

$20,000,000

$25,000,000

$30,000,000

Page 15: "Weaving Your Way Through the Web of Technology Conference 2008"

Prescription Drug Monitoring

$0$1,000,000$2,000,000$3,000,000$4,000,000$5,000,000$6,000,000$7,000,000$8,000,000$9,000,000

$10,000,000

Page 16: "Weaving Your Way Through the Web of Technology Conference 2008"

Gun Violence Prosecution/Project Safe Neighborhoods

$0

$10,000,000

$20,000,000

$30,000,000

$40,000,000

$50,000,000

$60,000,000

$70,000,000

$80,000,000

Page 17: "Weaving Your Way Through the Web of Technology Conference 2008"

Training Programs to Assist Probation and Parole Officers(Sex Offender Management)

$1,000,000

$2,000,000

$3,000,000

$4,000,000

$5,000,000

$6,000,000

$7,000,000

$8,000,000

$9,000,000

$10,000,000

Page 18: "Weaving Your Way Through the Web of Technology Conference 2008"

Victim Notification System(SAVIN)

$0$1,000,000$2,000,000$3,000,000$4,000,000$5,000,000$6,000,000$7,000,000$8,000,000$9,000,000

$10,000,000

Page 19: "Weaving Your Way Through the Web of Technology Conference 2008"

When Seeking Funds

• Did you respond to the established criteria of the RFP?

• Did you have someone outside of the process proofread your proposal?

• Are your leaders and target community supportive of the application, to include a formal Memorandum of Understanding?

• Is your application clearly written and do the headings match the information requested in the RFP?

• Do not assume the reviewer understands your needs.

• Have you been timely?

Page 20: "Weaving Your Way Through the Web of Technology Conference 2008"

The “must have”

• Executive Summary• NO MORE than 2 ½ pages• The problem• The solution (include methodology)• The time• The cost

• The “elevator speech”• Ability to clearly state the project in a short amount of time

• Convey the value; not only to you, but the masses(including that person)

• Strong strategic champion

• Know the difference between “start up” and “proof-of-concept”

Page 21: "Weaving Your Way Through the Web of Technology Conference 2008"

Why programs don’t get funded

• Not meeting the guidelines

• No clear mission or description of project

• Failure to answer questions

• Roles of partners not defined

• Required partners not identified

• Failure to follow directions• Length/spacing• Number of copies• Binding• Attachments

• Deadline

• Grant history

• No performance measures

Page 22: "Weaving Your Way Through the Web of Technology Conference 2008"
Page 23: "Weaving Your Way Through the Web of Technology Conference 2008"

NIEM

PDMP

RISS GLOBALN-DEX

R-DEX

One DOJ

FBIDHS

GJXDM

LEISP

NSAATF

ICESEARCH

NDAANW3C

NGALEITSCIACP

DEANCIS

NSOPW

NSOR

SAR

SAVIN

Fusion Center IEPD

Page 24: "Weaving Your Way Through the Web of Technology Conference 2008"

National Initiatives

• The National Criminal Intelligence Sharing Plan

• National Strategy for Information Sharing

Page 25: "Weaving Your Way Through the Web of Technology Conference 2008"

National Initiatives

• Information Sharing Environment (ISE) Implementation Plan

• Fusion Center Guidelines

Page 26: "Weaving Your Way Through the Web of Technology Conference 2008"

What Is a Fusion Center?

• Defined as a “collaborative effort of two or more agencies that provide resources, expertise, and information to the center with the goal of maximizing their ability to detect, prevent, investigate, and respond to criminal and terrorist activity”

• State and major urban area fusion centers are key to the nationwide information sharing framework

Page 27: "Weaving Your Way Through the Web of Technology Conference 2008"

Why Is the Fusion Process Important?

• Supports an all-sources, all-crimes, all-hazards, all-threats approach to intelligence

• Blends data from different sources, including law enforcement, public safety, and the private sector

• Supports risk-based, information-driven prevention, response, and consequence management programs

• Supports intelligence-led policing

• Fusion is the overarching process of managing the flow of information and intelligence across all levels and sectors of government and the private sector

Page 28: "Weaving Your Way Through the Web of Technology Conference 2008"

Current State of States

Page 29: "Weaving Your Way Through the Web of Technology Conference 2008"

Northeast

Southeast

Midwest

West

Development of Formalized Regions

• Formalized regions will• Promote

interconnectivity

• Leverage existing resources

• Facilitate delivery of DHS/DOJ Fusion Process Training and Technical Assistance program offerings

Page 30: "Weaving Your Way Through the Web of Technology Conference 2008"

Current Fusion Center Efforts

• Designation of a primary fusion center within state

• Nationwide assessment of fusion center capabilities by DHS and DOJ

• Addressing use of National Guard personnel within fusion centers

• National Information Exchange Model (NIEM)

• Development of Regional Training and Technical Assistance

Page 31: "Weaving Your Way Through the Web of Technology Conference 2008"

31

Information sharing is a national imperative

In detecting, preventing, responding to and investigating crimes, disasters and terrorist acts, the exchange of information among multiple engaged agencies must be timely and accurate and therefore highly automated.

Most existing computer systems are not designed to facilitate information sharing across disciplines and jurisdictions.

Automated information sharing between agencies requires the definition of common standards for linking disparate systems among federal, state, local and tribal agencies.

Page 32: "Weaving Your Way Through the Web of Technology Conference 2008"

32

NIEM IS:

• A data standard – with agreed-upon terms, definitions, and formats.

• Independent of the way data is stored in individual systems.

• A way to achieve consensus on the content of specific exchanges

• A structured approach to data interoperability

Page 33: "Weaving Your Way Through the Web of Technology Conference 2008"

33

Participating Communities and Governance

Defining Data Components

Defining data components unique to a domain will be done by subject matter experts who are representatives of the domain following basic rules for definitions and terms

A group representing all participating domains will define those data components that are universal or commonly used by more than one domain again using the same basic rules

Page 34: "Weaving Your Way Through the Web of Technology Conference 2008"

34

How NIEM Works to Support Information Sharing

• Create a scenario to define the need for information sharing between organizations

• Define the requirements including the data components that should be included

• Use the data component standards from NIEM to design the exchange, extending them where needed

• Document the exchange using technology standards

• Implement the exchange

Scenario Planning

RequirementsAnalysis

Data Mapping

Publish and Implement

Page 35: "Weaving Your Way Through the Web of Technology Conference 2008"

35

Federal Adoption and Use

• OASIS Electronic Court Filing Technical Committee plans a 2008 release of IEPDs conformant with NIEM.

• DOJ programs, such as LCMS and Sentinel, through their system design efforts are ensuring their exchanges will be NIEM-conformant.

• DHS built a Hospital Availability IEPD and is planning or building 10 other NIEM-conformant IEPDs, including Federated Person Query and Terrorist Watchlist.

• The Program Manager-Information Sharing Environment has declared that NIEM will be the standard for sharing counterterrorism information.

• FBI has released the preliminary IEPD and schema for N-DEx consistent with release 2.0 of NIEM.

• FBI has created an IEPD based on the planned interface between N-DEx and Sentinel.

• FEMA has developed some specific NIEM-compliant schema – vetted through

the NIEM Help Desk – for partner agencies at the federal, state, tribal and local levels to use for external data submission exchanges with the Homeland Security Exercise and Evaluation Program (HSEEP) Toolkit.

Page 36: "Weaving Your Way Through the Web of Technology Conference 2008"

36

State & Local Adoption and Use

• New York Division of Criminal Justice Services is utilizing NIEM to implement all CJIS information exchanges.

• Florida is utilizing NIEM for all law enforcement information exchanges.

• Pennsylvania JNET project is developing a plan for upgrading its installed GJXDM based information exchanges to NIEM.

• Texas has begun to develop a plan for statewide adoption of NIEM as the standard for information exchanges.

• Maryland Department of Transportation is exploring the use of NIEM for information exchanges between transportation centers and public safety.

• California is planning to convert their court content management system interfaces to NIEM and to map their e-filing standard (2GEFS) to NIEM.

• New York state and NLETS are developing a NIEM RAP Sheet pilot IEPD.

Page 37: "Weaving Your Way Through the Web of Technology Conference 2008"

37

Why NIEM Now?

1. NIEM Is Tested, Ready, and in Production.

2. Documentation and Tools Are Available.

3. Training and Technical Assistance Are Available.

4. A Release Plan Is in Place.

5. Current and Future Grants Mandate NIEM Conformance.

6. Reference IEPDs Are Being Developed.

7. NIEM Is the Means for Intergovernmental Information Sharing.

Page 38: "Weaving Your Way Through the Web of Technology Conference 2008"

SAR Operational Study

• Partnership between PM-ISE, DOJ, DHS, DOD

• Minimum 3 locations to reflect fusion center, law enforcement, and military (force protection)

• Two SAR (Suspicious Activity Report) elements• Summary SAR repository (without PII)• Connection of participants to share SAR (with PII)

• Architecture specifically design to connect fusion centers allowing them to search SAR information

• Intention to expand to all 50 states and UASI sites

Page 39: "Weaving Your Way Through the Web of Technology Conference 2008"
Page 40: "Weaving Your Way Through the Web of Technology Conference 2008"

RISS LEO

RESULTS PAGE

SEARCH PAGE

SUBMIT

Current Access Points

FC SAR

UPLOAD Process

SUBMIT

E-Guardian HSIN

Possible Future Access Points

Page 41: "Weaving Your Way Through the Web of Technology Conference 2008"

Summary SAR Search

Page 42: "Weaving Your Way Through the Web of Technology Conference 2008"

Summary Suspicious Activity Report SearchThe document obtainable through this search engine are those produced by Fusion Centers and are designed to be summary in nature describing incidents/contacts/activity and do not

contain person identifying information (PII), The documents searched are in a free text format such as MS Work, Adobe, WordPerfect. Etc.

Enter single word, multiple words, or phrase:

For the most optimum results use the following format suggestions•MULTIPLE WORDS – use “+” sign between, ex. Truck +bridge +photos•PHRASE – for specific phrase enclose in quotation, ex. “green pickup”

Select time frame of entered documents to be searched:

Between

MO DAY YR SEARCH30 days

60 days

90 days

ALL

State

Page 43: "Weaving Your Way Through the Web of Technology Conference 2008"

Summary SAR Search

STATE FUSION CENTER

DATE ENTERED

Match

NY Albany 3/4/2007

VA Richmond 3/11/2008

VA Richmond 4/10/2008

IL Chicago 3/16/2008

FL FDLE 4/1/2008

FL FDLE 4/8/2008

RESULTS PAGE

RETURN TO SEARCH NEW SEARCH

95%

85%

72%

50%

94%

20%

Page 44: "Weaving Your Way Through the Web of Technology Conference 2008"

Summary SAR Search

Contact Information

New York State Intelligence Center

Person submitting documentLarry Jones, Intelligence [email protected]

Contact for verifying informationLt. Mary Smith, Unit [email protected]

Page 45: "Weaving Your Way Through the Web of Technology Conference 2008"
Page 46: "Weaving Your Way Through the Web of Technology Conference 2008"

SAR

SBU Access Point

SARIEPD

E-Guardian HSIN

Possible Future Access Points

SEARCH PAGE

SARSARIEPD

SARSARIEPD

RESULTSPAGE

SEARCH

RESPONSE

Page 47: "Weaving Your Way Through the Web of Technology Conference 2008"

What is 28 CFR Part 23?

• 28 Code of Federal Regulations (CFR) Part 23 is a regulation governing interjurisdictional and multijurisdictional criminal intelligence systems

• These are operated by or on behalf of state and local law enforcement agencies and that are funded with certain federal funds. 

• It is a federal regulation issued by the U.S. Department of Justice in 1980, revised in 1993, and clarified in 1998 to address circumstances evolving with changing technologies and law enforcement needs. 

• Is currently under revision review.

• It is applicable to “criminal intelligence systems,” offering guidance on the collection, storage, and dissemination of criminal intelligence information. 

Page 48: "Weaving Your Way Through the Web of Technology Conference 2008"

Gangs

• Maintaining the National Gang Center (www.nationalgangcenter.org)

• Conducted 2005 National Gang Threat Assessment with NAGIA, FBI, ATF, NDIC

• Developing gang enforcement training for local law enforcement (basic, advanced, commander, CEO)

Page 49: "Weaving Your Way Through the Web of Technology Conference 2008"
Page 50: "Weaving Your Way Through the Web of Technology Conference 2008"

Regional Information Sharing Systems

Page 51: "Weaving Your Way Through the Web of Technology Conference 2008"

RISSRISS

Bureau of Justice AssistanceBureau of Justice AssistanceBBJJAA

Regional Information Sharing Systems Program

RISS Geographical RegionsRISS Geographical Regions

WSIN

RMIN

MOCIC

ROCIC

MAGLOCLEN

NESPIN

Page 52: "Weaving Your Way Through the Web of Technology Conference 2008"

RISSRISS

Bureau of Justice AssistanceBureau of Justice AssistanceBBJJAA

Regional Information Sharing Systems Program

Elements of the ProgramElements of the Program• Supports investigative and prosecution efforts of member

agencies

• Structured system facilitates communication and cooperation among law enforcement agencies

• Regional differences

• Centers are prohibited from operational case involvement

• No turf

Page 53: "Weaving Your Way Through the Web of Technology Conference 2008"

RISSRISS

Bureau of Justice AssistanceBureau of Justice AssistanceBBJJAA

Regional Information Sharing Systems Program

Membership Support ServicesMembership Support Services• Service components

– Information sharing– Telecommunications – Analytical – Investigative support – Specialized equipment– Training– Technical assistance (field staff)

Page 54: "Weaving Your Way Through the Web of Technology Conference 2008"

RISSRISS

Bureau of Justice AssistanceBureau of Justice AssistanceBBJJAA

Regional Information Sharing Systems Program

Summary of Support ServicesSummary of Support Services• Investigative and intelligence analysis support – RISS produced over 21,000

analytical products in FY2006. RISS creates link charts, telephone toll analysis, crime scene diagrams and other products. RISS also supports computer forensics and video and audio enhancements.

• Equipment sharing – RISS loans over 4,500 pieces of specialized equipment annually.

• Investigative funds support – RISS loans confidential funds to member agencies to support investigations, including purchase of services and contraband, as well as case travel and other assistance.

• Criminal activity bulletins and publications – RISS produces almost 200 publications annually and distributes them to nearly 300,000 law enforcement personnel.

• Training – In FY2006, more than 65,000 officers were trained.

• Technical assistance – RISS field staff liaise with member agencies to ensure deliver of RISS services and to provide support regarding RISSNET installation and training.

Page 55: "Weaving Your Way Through the Web of Technology Conference 2008"

RISSRISS

Bureau of Justice AssistanceBureau of Justice AssistanceBBJJAA

Regional Information Sharing Systems Program

RISS Automated Trusted Information eXchange — (ATIX)

RISS Automated Trusted Information eXchange — (ATIX)

• A vehicle for nationwide dissemination of national security information

• Allows access to the secure network by non-RISS members

• Includes Public Service, Public Safety, Public Utility, EMS, Governors, Mayors, Airport Security

• States will usually manage ATIX tier access

Page 56: "Weaving Your Way Through the Web of Technology Conference 2008"

RISSRISS

Bureau of Justice AssistanceBureau of Justice AssistanceBBJJAA

Regional Information Sharing Systems Program

RISSafeRISSafe• Designed to store and maintain data on all planned law enforcement

events, (e.g., raids, controlled buys, surveillances)

• Goal to identify and alert affected agencies of potential conflicts impacting law enforcement efforts.

• Will be used in conjunction with mapping software, data on event locations will be verified when officers enter information into the system or when RISS staff members assist officers.

• RISS staff at the Watch Center will assist officers, monitor activities, respond to conflicts, and notify affected parties

• Currently in testing status and has funding for national implementation

Page 57: "Weaving Your Way Through the Web of Technology Conference 2008"

57

NEED TO KNOW

• Where to find funding opportunities• www.grants.gov

• Your representation at BJA• SAA (PCCD in PA)• Tracey Willis (State Policy Advisor for PA)

• Byrne Solicitation to be posted soon• Preventing Crime and Drug Abuse• Enhancing Local Law Enforcement• Enhancing Local Courts• Enhancing Local Correction and Offender Re-entry• Facilitating Justice Information Sharing

Page 58: "Weaving Your Way Through the Web of Technology Conference 2008"

58

Mr. David P. LewisSenior Policy AdvisorJustice Information Sharing(202) [email protected]