Transcript Slide 1

Information Sharing:
Challenges, Trends, and Opportunities
The National Criminal
Intelligence Sharing Plan
(NCISP)
Sharing information in Public Safety
• The concept and need is widely accepted, BUT;
•
•
•
•
•
•
•
Is misunderstood
Has obstacles and oppositions
Data control is an issue (who sees what)
Can have legislative restraints
No longer discipline specific
Information vs intelligence
Funding can be an issue
• Most initiatives are regional and within state
boundaries
Information Sharing Methods:
Sheriff/Poli
ce
Courts
IBM
Unisys
Data
bas
e
Correcti
ons
Data
bas
e
IBM
Courts
Sheriff/Polic
e
Data
bas
e
Data
base
Probation
Point-to-point
Correcti
ons
Data
base
Desktop
Central
integration
and data
Repository
exchange
NT
Data
bas
e
Data
base
Probation
Data
base
by
Centralpowered
Repository
JNET
Other
State
Systems
Other
State Systems
Data
base
DA’s Office
Data
bas
e
911 Center
DA’s
Office
911 Center
NT
Sheriff/P
olice
Sheriff/Po
lice
Data
Connector
base
Other
State
Systems
Connector
Correcti
ons
Cou
rts
Data
Connector
base
Data
Connector
base
Probati
on
Data
Connector
base
DA’s
Office
911
Center
Data
Connector
base
Connector
Central Repository
INFORMATION
SERVICE
SECURITY
SERVICE
Da
tab
as
e
Da
tab
as
e
Message Hub
Desktop
Message Hub
integration
and data
exchange
powered
by JNET
Middleware software
Middleware
QUERY
SERVICE
Courts
Other
State
Systems
911
Center
Corre
ctions
Da
tab
as
e
Probatio
n
Da
tab
as
e
Da
tab
asDA’s
eOffice
Information May Need to Be Classified
• Information may be:
•
•
•
•
Incident based
Intelligence
General information
Obtained from private sources
(Lexis-Nexis, Choicepoint, city, county, etc.)
• The classification of information will determine who
can use it and how it can be used
• Not all information will be used by all users
Making the Jump Across State Lines
• A few national/multi-state projects
•
•
•
•
NCIC
Triple III
Nlets
NSOPW
•RISS
•HSIN
•EPIC
•CISAnet
•LEO
•N-DEx
•ARJIS
•CapWIN
• The greatest misunderstood project by;
• The ACLU
• The media
• The public
• BUT not by agencies using it
MATRIX Lessons Learned:
• Strong foundation before transitioning into implementation
• Projects are bound by an understanding among participants
• Although MATRIX understood its mission and goals, the mission
was not formalized and articulated to a wide audience
• Leadership is extremely critical in the success
• Involve private-sector privacy experts to assist in developing and
vetting a privacy policy;
• If possible, the privacy policy should be available to the public
• Describe information collected and how information is stored
• Ensure all other policies and internal controls are consistent
with the privacy policy
Fusion Center Guidelines—
Law Enforcement, Public Safety, and the Private Sector
Global Justice Information
Sharing Initiative (Global)
Homeland Security Advisory
Council (HSAC)
What Is a Fusion Center?
• A collaborative effort of two or more
agencies that provide resources, expertise,
and/or information to the center with the
goal of maximizing the ability to detect,
prevent, investigate, apprehend, and
respond to criminal and terrorist activity
Why Is the Fusion Process Important?
• Supports an all-source, all-crimes, all-hazards, all-threats
approach to intelligence
• Blends data from different sources, including law enforcement,
public safety, and the private sector
• Supports risk-based, information-driven prevention, response, and
consequence management programs
• Supports intelligence-led policing
• Fusion is the overarching process of managing the flowing of
information and intelligence across all levels and sectors of
government and the private sector
Privacy Policy Development Guide
•
Geared toward the justice practitioner charged with
developing or revising an agency’s privacy policy
•
A practical, hands-on resource providing
sensible guidance to develop a privacy policy
•
This guide is the next logical step for
those justice entities ready to move
beyond awareness to actual policy
development process
•
It assists agencies in articulating privacy
obligations in a manner that protects the
justice agency, the individual, and the public
and makes it easier to do what is necessary—
share critical justice information
The Design:
•
•
•
•
•
Distributed model
Service Oriented Architecture (SOA)
Web Services
US DOJ XML
National search engine, local control
The Results:
•
•
•
•
•
Connected 22 sites in 60 days
Connected additional 28 sites in 5 months
Over 27 million hits in first 48 hours
Peeked at 977 hits per second
After 63 weeks – over 611 million hits
Dru Sjodin National Sex Offender Public Website
Search sent to server
Search sent to states’ repositories
Citizen enters data
Internet
Citizen selects name to view data
NSOPR
Web Server
Server delivers
results to web page
Search results
back to server
Current status
50 States + District of Columbia + Guam
Best practices:
•
•
•
•
•
Identify the stakeholders
Leverage work already completed
Cleary identify the policy decision maker
Cleary identify the technical lead
Adapt to what already exists
Lessons learned:
•
•
•
•
•
Keep policy and technology separate
Be open to suggestions from stakeholders
Realize “there is no one solution”
Design tool based on abilities
Federal and state can work together
David P. Lewis
[email protected]
202-616-7829
Senior Policy Advisor
Justice Information Sharing
DOJ/OJP/BJA