The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Fog Computing Conceptual Model||
Managing the data generated by Internet of Things (IoT) sensors and actuators is one of the biggest challenges faced when deploying an IoT system. Traditional cloud-based IoT systems are challenged by the large scale, heterogeneity, and high latency witnessed in some cloud ecosystems. One solution is to decentralize applications, management, and data analytics into the network itself using a distributed and federated compute model. This approach has become known as fog computing. This document presents the conceptual model of fog and mist computing and how they relate to cloud-based computing models for IoT. This document further characterizes important properties and aspects of fog computing, including service models, deployment strategies, and provides a baseline of what fog computing is, and how it may be used.
|Cloud Computing||Data Management, Communications||2018|
|DHS S&T Cyber Security Division 2018 Portfolio Guide||
The DHS Science & Technology, Cyber Security Division, 2018 Portfolio Guide presents in-depth summaries of S&T’s various cybersecurity R&D program areas—from Cyber for Critical Infrastructure to Cyber Physical System Security. In all, the guide delivers 15 insightful overviews—including one about the DHS Silicon Valley Innovation Program—encompassing the totality of S&T’s broad cybersecurity research portfolio.
|DHS S&T Cyber Security Division Technology Guide 2018||
The DHS Science & Technology (S&T) Cyber Security Division, Technology Guide focuses on individual S&T research efforts to provide stakeholders an insider’s look at more than 70 mature, S&T-funded R&D technologies and solutions plus Transition to Practice technologies that are ready for adoption and marketplace transition. The technologies presented are from research project areas such as Software Assurance, Mobile Security, Identity Management, Distributed Denial of Service Defense, Data Privacy, Cyber Competitions, Cyber Forensics and more.
|National Association of State Budget Officers (NASBO) Spring 2017 Fiscal Survey of States||
The Fiscal Survey of States is published twice annually by the National Association of State Budget Officers (NASBO). The survey presents aggregate and individual data on the states' general fund receipts, expenditures, and balances. These general funds are used to finance most broad-based state services and are the most important elements in determining the fiscal health of the states.
|Challenges & Trends in Public Sector IT Operations: United States||
Public sector organizations are feeling the pains of digital transformation. Faced with modernization, data center upgrades and continuous cloud-first initiatives, this transformation of the IT environment is making it a challenge to deliver services, comply with service level agreements (SLAs), meet citizens’ expectations and achieve organizational missions.
Challenges & Trends in Public Sector IT Operations: the United States, a research study conducted by the Ponemon Institute and sponsored by Splunk of 1,227 decision makers and operations staff across federal, state and local governments, higher education and federal systems integrators and aerospace and defense industries, reveals that digital transformation is well underway with budgets shifting from traditional on premise investments to more cloud and agile development paradigms.
|Public Sector IT Operations||Uncategorized||2017|
|An Innovative Approach to Managing Video Redaction Services||
Leveraging Interoperability and “As a Service” To Enhance Body-Worn Camera Programs. CACI’s Digital Forensics Laboratory (CDFL) is a premier internationally accredited full service computer, mobile device, and audio/video forensics laboratory in Alexandria, VA providing a full range of onsite and offsite digital forensics services for government investigation, litigation, eDiscovery, FOIA, cyber security, and intelligence projects.
|An Innovative Approach to Managing Video Redaction Services||Data Management, Communications, Security, Mobile/Portable Computing, Technology Equipment||2017|
|Law Enforcement Agencies, Body-Worn Cameras, and the Freedom Of Information Act||
Managing the Need For Increased Redaction Capabilities. CACI’s Digital Forensics Laboratory (CDFL) is a premier internationally accredited full service computer, mobile device, and audio/video forensics laboratory in Alexandria, VA providing a full range of onsite and offsite digital forensics services for government investigation, litigation, eDiscovery, FOIA, cyber security, and intelligence projects.
|Law Enforcement Agencies, Body-Worn Cameras, and the Freedom Of Information Act||Data Management, Communications, Security, Mobile/Portable Computing, Technology Equipment||2017|
|Criminal Justice Information Services (CJIS) Security Policy (v5.6)||
Law enforcement needs timely and secure access to services that provide data wherever andwhenever for stopping and reducing crime. In response to these needs, the Advisory Policy Board(APB) recommended to the Federal Bureau of Investigation (FBI) that the Criminal JusticeInformation Services (CJIS) Division authorize the expansion of the existing security managementstructure in 1998.Administered through a shared management philosophy, the CJIS SecurityPolicy contains information security requirements, guidelines, and agreements reflecting the willof law enforcement and criminal justice agencies for protecting the sources, transmission, storage,and generation of Criminal Justice Information (CJI).The Federal Information SecurityManagement Act of 2002 provides further legal basis for the APB approved management,operational, and technical security requirements mandated to protect CJI and by extension thehardware, software and infrastructure required to enable the services provided by the criminaljustice community.
|2017 SAFECOM Strategic Plan||
The SAFECOM Strategic Plan and Implementation Guide is a stakeholder-driven plan that aims to enhance operability and interoperability for public safety communications through the education of the community, decision makers, and elected officials on short- and mid-term priorities and their associated annual products and activities.
The Plan also provides clarification on SAFECOM’s strategies to prioritize resources, strengthen governance, identify future investments, and address interoperability gaps over the long term. Additionally, this Plan:
|Public Safety Interoperability||Communications||2017|
|License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities||
To support justice entities in their efforts to implement License Plate Reader (LPR) policies and procedures, this policy development template was developed by state, local, and federal law enforcement and criminal justice partners and is designed to assist justice entity personnel—whether in a law enforcement or homeland security agency, a fusion center, or an intelligence unit—in developing a comprehensive LPR policy.
|License Plate Readers||Mobile/Portable Computing||2017|