Transcript Slide 1
Information Sharing: Challenges, Trends, and Opportunities The National Criminal Intelligence Sharing Plan (NCISP) Sharing information in Public Safety • The concept and need is widely accepted, BUT; • • • • • • • Is misunderstood Has obstacles and oppositions Data control is an issue (who sees what) Can have legislative restraints No longer discipline specific Information vs intelligence Funding can be an issue • Most initiatives are regional and within state boundaries Information Sharing Methods: Sheriff/Poli ce Courts IBM Unisys Data bas e Correcti ons Data bas e IBM Courts Sheriff/Polic e Data bas e Data base Probation Point-to-point Correcti ons Data base Desktop Central integration and data Repository exchange NT Data bas e Data base Probation Data base by Centralpowered Repository JNET Other State Systems Other State Systems Data base DA’s Office Data bas e 911 Center DA’s Office 911 Center NT Sheriff/P olice Sheriff/Po lice Data Connector base Other State Systems Connector Correcti ons Cou rts Data Connector base Data Connector base Probati on Data Connector base DA’s Office 911 Center Data Connector base Connector Central Repository INFORMATION SERVICE SECURITY SERVICE Da tab as e Da tab as e Message Hub Desktop Message Hub integration and data exchange powered by JNET Middleware software Middleware QUERY SERVICE Courts Other State Systems 911 Center Corre ctions Da tab as e Probatio n Da tab as e Da tab asDA’s eOffice Information May Need to Be Classified • Information may be: • • • • Incident based Intelligence General information Obtained from private sources (Lexis-Nexis, Choicepoint, city, county, etc.) • The classification of information will determine who can use it and how it can be used • Not all information will be used by all users Making the Jump Across State Lines • A few national/multi-state projects • • • • NCIC Triple III Nlets NSOPW •RISS •HSIN •EPIC •CISAnet •LEO •N-DEx •ARJIS •CapWIN • The greatest misunderstood project by; • The ACLU • The media • The public • BUT not by agencies using it MATRIX Lessons Learned: • Strong foundation before transitioning into implementation • Projects are bound by an understanding among participants • Although MATRIX understood its mission and goals, the mission was not formalized and articulated to a wide audience • Leadership is extremely critical in the success • Involve private-sector privacy experts to assist in developing and vetting a privacy policy; • If possible, the privacy policy should be available to the public • Describe information collected and how information is stored • Ensure all other policies and internal controls are consistent with the privacy policy Fusion Center Guidelines— Law Enforcement, Public Safety, and the Private Sector Global Justice Information Sharing Initiative (Global) Homeland Security Advisory Council (HSAC) What Is a Fusion Center? • A collaborative effort of two or more agencies that provide resources, expertise, and/or information to the center with the goal of maximizing the ability to detect, prevent, investigate, apprehend, and respond to criminal and terrorist activity Why Is the Fusion Process Important? • Supports an all-source, all-crimes, all-hazards, all-threats approach to intelligence • Blends data from different sources, including law enforcement, public safety, and the private sector • Supports risk-based, information-driven prevention, response, and consequence management programs • Supports intelligence-led policing • Fusion is the overarching process of managing the flowing of information and intelligence across all levels and sectors of government and the private sector Privacy Policy Development Guide • Geared toward the justice practitioner charged with developing or revising an agency’s privacy policy • A practical, hands-on resource providing sensible guidance to develop a privacy policy • This guide is the next logical step for those justice entities ready to move beyond awareness to actual policy development process • It assists agencies in articulating privacy obligations in a manner that protects the justice agency, the individual, and the public and makes it easier to do what is necessary— share critical justice information The Design: • • • • • Distributed model Service Oriented Architecture (SOA) Web Services US DOJ XML National search engine, local control The Results: • • • • • Connected 22 sites in 60 days Connected additional 28 sites in 5 months Over 27 million hits in first 48 hours Peeked at 977 hits per second After 63 weeks – over 611 million hits Dru Sjodin National Sex Offender Public Website Search sent to server Search sent to states’ repositories Citizen enters data Internet Citizen selects name to view data NSOPR Web Server Server delivers results to web page Search results back to server Current status 50 States + District of Columbia + Guam Best practices: • • • • • Identify the stakeholders Leverage work already completed Cleary identify the policy decision maker Cleary identify the technical lead Adapt to what already exists Lessons learned: • • • • • Keep policy and technology separate Be open to suggestions from stakeholders Realize “there is no one solution” Design tool based on abilities Federal and state can work together David P. Lewis [email protected] 202-616-7829 Senior Policy Advisor Justice Information Sharing DOJ/OJP/BJA