Publications

The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
National Emergency Communications Plan (NECP) - Updated

DHS worked with stakeholders from federal, state, local, tribal, and territorial agencies, public safety associations, and the private sector to develop the National Emergency Communications Plan (NECP)—a strategic plan that establishes a national vision for the future state of emergency communications:

  • To enable the Nation’s emergency response community to communicate and share information securely across communications technologies in real time, including all levels of government, jurisdictions, disciplines, organizations, and citizens impacted by any threats or hazards event 
Emergency Communications Data Management, Communications September 2019
NENA NG9-1-1 Go-To Handbook

The purpose and scope of this document is to provide guidance to help 9-1-1 Authorities create a smooth, timely and efficient project management approach and transition plan to accomplish implementation of NG9-1-1.

NG9-1-1 Communications May 2019
A Comparison of Averted and Completed School Attacks from the Police Foundation Averted School Violence Database

The Police Foundation, in collaboration with the COPS Office, implemented the Averted School Violence (ASV) database to provide a platform for sharing information about averted incidents of violence in institutions of elementary, secondary, and higher education. As a companion to the preliminary report on the ASV database (Daniels 2018), this report compares 51 completed with 51 averted incidents of school violence from the ASV database and analyzes both sets. It includes findings on the demographics of individuals who plan attacks, victims' demographics in completed attacks, and community characteristics; it also provides important recommendations to minimize school violence and improve student and school safety.

School Security Security February 2019
Platform Firmware Resiliency Guidelines (NIST.SP.800-193)

This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks.  The platform is a collection of fundamental hardware and firmware components needed to boot and operate a system. The technical guidelines in this document promote resiliency in the platform by describing security mechanisms for protecting the platform against unauthorized changes, detecting unauthorized changes that occur, and recovering from attacks rapidly and securely.

Platform Firmware Security May 2018
Quick Start Guide for Populating Mobile Test Devices

This guide describes how to populate a mobile device as part of testing a mobile forensic tool.  It was built to be used with Federated Testing, but can also be used to populate a device for use with other test approaches.  The Federated Testing project is an expansion of the Computer Forensics Tool Testing (CFTT) Program at NIST which provides digital forensics investigators and labs with test materials for forensic tool testing. The goal of Federated Testing is to help digital forensics investigators to test the tools that they use in their labs and to enable sharing of tool test results within the digital forensics community. The goals of this guide are twofold: 1) provide guidance for how to populate (place test data on) a moblie device for use in forensic tool testing and 2) provide guidance to select data elements for inclusion that ensure effective testing.

Mobile Forensics Mobile/Portable Computing May 2018
DHS Cybersecurity Strategy

This strategy provides the Department with a framework to execute our cybersecurity responsibilities during the next five years to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient.

Cybersecurity Security May 2018
Framework for Improving Critical Infrastructure Cybersecurity version 1.1

Version 1.1 of this Cybersecurity Framework refines, clarifies, and enhances Version 1.0, which was issued in February 2014. It incorporates comments received on the two drafts of Version 1.1. Version 1.1 is intended to be implemented by first-time and current Framework users. Current users should be able to implement Version 1.1 with minimal or no disruption; compatibility with Version 1.0 has been an explicit objective.

Cyber Security Security April 2018
Fog Computing Conceptual Model

Managing the data generated by Internet of Things (IoT) sensors and actuators is one of the biggest challenges faced when deploying an IoT system.  Traditional cloud-based IoT systems are challenged by the large scale, heterogeneity, and high latency witnessed in some cloud ecosystems. One solution is to decentralize applications, management, and data analytics into the network itself using a distributed and federated compute model.  This approach has become known as fog computing.  This document presents the conceptual model of fog and mist computing and how they relate to cloud-based computing models for IoT.  This document further characterizes important properties and aspects of fog computing, including service models, deployment strategies, and provides a baseline of what fog computing is, and how it may be used.

Cloud Computing Data Management, Communications March 2018
DHS S&T Cyber Security Division 2018 Portfolio Guide

The DHS Science & Technology, Cyber Security Division, 2018 Portfolio Guide presents in-depth summaries of S&T’s various cybersecurity R&D program areas—from Cyber for Critical Infrastructure to Cyber Physical System Security. In all, the guide delivers 15 insightful overviews—including one about the DHS Silicon Valley Innovation Program—encompassing the totality of S&T’s broad cybersecurity research portfolio.

Cyber Security Security March 2018
DHS S&T Cyber Security Division Technology Guide 2018

The DHS Science & Technology (S&T) Cyber Security Division, Technology Guide focuses on individual S&T research efforts to provide stakeholders an insider’s look at more than 70 mature, S&T-funded R&D technologies and solutions plus Transition to Practice technologies that are ready for adoption and marketplace transition. The technologies presented are from research project areas such as Software Assurance, Mobile Security, Identity Management, Distributed Denial of Service Defense, Data Privacy, Cyber Competitions, Cyber Forensics and more.

Cyber Security Security March 2018

Pages