Information Sharing:Challenges, Trends, and Opportunities
Information Sharing:Challenges, Trends, and Opportunities
The National Criminal Intelligence Sharing Plan
(NCISP)
Sharing information in Public Safety• The concept and need is widely accepted, BUT;
• Is misunderstood • Has obstacles and oppositions• Data control is an issue (who sees what)• Can have legislative restraints• No longer discipline specific• Information vs intelligence• Funding can be an issue
• Most initiatives are regional and within state boundaries
Databas
e
Sheriff/Police
Unisys
DA’s Office
NT
Corrections
IBM
OtherState
Systems
Probation
NT
Courts
IBM
911 Center
Databas
e
Databas
e
Databas
e
Databas
e
Database
Sheriff/Police
DA’s Office
Corrections
Probation
Courts
911 Center
Database
Database
Database
Database
Desktop integration and data exchange powered by JNET
OtherState Systems
Central Repository
Information Sharing Methods:
OtherState
SystemsSheriff/Police
Corrections
Courts
Database
Database
DA’s Office
Probation
Database
Database
911 Center
Database
Middleware softwareMiddleware software
QUERYSERVICE
INFORMATIONSERVICE
SECURITYSERVICECentral Repository
Connector ConnectorConnector Connector Connector
ConnectorConnector
Database
Sheriff/Police
DA’s Office
Correction
s
Probation
Courts
911 Center
Database
Database
Database
Database
Desktop integration and data exchange powered by JNET
OtherState
Systems
Message Hub
Point-to-point CentralRepository
Middleware
Message Hub
Information May Need to Be Classified
• Information may be:• Incident based• Intelligence• General information• Obtained from private sources
(Lexis-Nexis, Choicepoint, city, county, etc.)
• The classification of information will determine who can use it and how it can be used
• Not all information will be used by all users
Making the Jump Across State Lines
• A few national/multi-state projects• NCIC• Triple III• Nlets• NSOPW
• The greatest misunderstood project by;• The ACLU• The media • The public
• BUT not by agencies using it
MATRIX
•RISS•HSIN•EPIC•CISAnet
•LEO•N-DEx•ARJIS•CapWIN
MATRIX Lessons Learned:• Strong foundation before transitioning into implementation
• Projects are bound by an understanding among participants
• Although MATRIX understood its mission and goals, the mission was not formalized and articulated to a wide audience
• Leadership is extremely critical in the success
• Involve private-sector privacy experts to assist in developing and vetting a privacy policy;
• If possible, the privacy policy should be available to the public
• Describe information collected and how information is stored
• Ensure all other policies and internal controls are consistent with the privacy policy
Fusion Center Guidelines—Law Enforcement, Public Safety, and the Private Sector
Global Justice Information Sharing Initiative (Global)
Homeland Security Advisory Council (HSAC)
What Is a Fusion Center?
• A collaborative effort of two or more agencies that provide resources, expertise, and/or information to the center with the goal of maximizing the ability to detect, prevent, investigate, apprehend, and respond to criminal and terrorist activity
Why Is the Fusion Process Important?• Supports an all-source, all-crimes, all-hazards, all-threats
approach to intelligence
• Blends data from different sources, including law enforcement, public safety, and the private sector
• Supports risk-based, information-driven prevention, response, and consequence management programs
• Supports intelligence-led policing
• Fusion is the overarching process of managing the flowing of information and intelligence across all levels and sectors of government and the private sector
Privacy Policy Development Guide• Geared toward the justice practitioner charged with developing or revising an
agency’s privacy policy
• A practical, hands-on resource providing sensible guidance to develop a privacy policy
• This guide is the next logical step forthose justice entities ready to move beyond awareness to actual policy development process
• It assists agencies in articulating privacy obligations in a manner that protects the justice agency, the individual, and the public and makes it easier to do what is necessary—share critical justice information
The Design:• Distributed model• Service Oriented Architecture (SOA)• Web Services• US DOJ XML• National search engine, local control
The Results:• Connected 22 sites in 60 days• Connected additional 28 sites in 5 months• Over 27 million hits in first 48 hours• Peeked at 977 hits per second• After 63 weeks – over 611 million hits
NSOPR Web Server
Search sent to states’ repositoriesSearch sent to server
Internet
Citizen enters data
Server delivers results to web page
Citizen selects name to view data
Search resultsback to server
Dru Sjodin National Sex Offender Public Website
Current status50 States + District of Columbia + Guam
Best practices:• Identify the stakeholders• Leverage work already completed• Cleary identify the policy decision maker• Cleary identify the technical lead• Adapt to what already exists
Lessons learned:• Keep policy and technology separate• Be open to suggestions from stakeholders• Realize “there is no one solution”• Design tool based on abilities• Federal and state can work together
David P. LewisSenior Policy AdvisorJustice Information SharingDOJ/OJP/BJA
David P. LewisSenior Policy AdvisorJustice Information SharingDOJ/OJP/BJA
Top Related