Publications

The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
Video Surveillance Storage: Enabling Infrastructure for Next Generation Security Systems

Demand remains high for video surveillance solutions. In addition to the increasing volume of surveillance cameras shipped annually, technological advances mean each new generation of surveillance cameras benefit from improvements in image quality. Image quality is a complex matrix influenced by many different elements. Generally, improved image quality means greater data storage requirements. Whilst there are continuing advances in compression technologies providing a trade-off between image quality, bandwidth and storage requirements, these cannot completely mitigate the increase in data associated with higher quality video. Simply put, more storage and more compute is required to manage data from an increasing number of surveillance cameras capturing higher quality video.

Security, Data Storage Data Management, Security February 2016
The Surveillance Infrastructure is Changing: How to Prepare for an Influx in Video

Why Choosing the Right Surveillance Storage Matters.

Data Security, Data Storage Data Management, Security February 2016
FirstNet Single Point of Contact by State

Looking for your State’s FirstNet Contact? Click here to obtain the full list of FirstNet Contacts by State.

FirstNet, Broadband, Data Communications Communications January 2016
Examining Electronic Monitoring Technologies

Each year, millions of pretrial defendants and convicted offenders are supervised in their communities as they await trial or serve periods of probation or parole. Local and state agencies are increasingly using electronicmonitoring (EM) technologies to supplement supervision, tracking where offenders go and whether they are using alcohol or drugs.

Although recent studies have found that electronic monitoring is a promising tool for reducing recidivism and controlling corrections costs, questions remain about its effectiveness as an alternative to incarceration. The Pew Charitable Trusts recently interviewed five experts to get their perspectives on the uses, advantages, and disadvantages of EM technologies, as well as possible directions for future research.

Electronic Monitoring Data Management January 2016
Kansas City, Missouri Smart Policing Initiative

Kansas City, Missouri is a Midwestern city with a historically high rate of violent crime. Kansas City has a population of approximately 460,000 citizens who are distributed across some 319 square miles and who are served by the KCPD. Kansas City’s population is approximately 30 percent African-American and 10 percent Hispanic. Twelve percent of households are headed by single parents with children under age 18, and almost one-fifth of its citizens live below the poverty line. KCPD employs more than 1,400 sworn officers, the majority of whom are assigned to the Patrol Bureau, which operates across six patrol divisions. 

The city has had a serious violent crime problem that overwhelmingly involves guns, and that is concentrated in the urban center. From 2010 through 2013,  Kansas City ranked among the worst of the 50 largest cities in the United States for homicide, averaging more than 100 per year—for a rate of 22 per 100,000
residents, which is four times the national average. Kansas City’s violent crime rate in 2012 was equally dismal—2,476 aggravated assaults were reported, a significant increase from 2010 (n=2,371) and 2011 (n=2,274). There were 1,617 robberies in 2010, but in 2011, 2012, and 2013, totals rose to 1,673, 1,645, and 1,716, respectively.

A significant portion of the violent crime in Kansas City involved guns. From 2010 through 2014, 86.3 percent of all homicides and nearly half (42.1 percent) of all aggravated assaults were gunrelated. Notably, those homicides occurred in a geographically concentrated area. Of the 394 homicides in Kansas City from 2011 through 2014, 85.5 percent (n=337) had occurred in the Central, Metro and East Divisions of the city. This gun violence has persisted despite the fact that KCPD has recovered an average of 984.4 handguns per year in the Central, Metro, and East Divisions, alone.

Security Security January 2016
Security of Interactive and Automated Access Management Using Secure Shell (SSH)

Users and hosts must be able to access other hosts in an interactive or automated fashion, often with very high privileges. This is necessary for a variety of reasons, including file transfers, disaster recovery, privileged access management, software and patch management, and dynamic cloud provisioning. Accessing other hosts is often accomplished using the Secure Shell (SSH) protocol. The SSH protocol supports several mechanisms for interactive and automated authentication. Management of this access requires proper provisioning, termination, and monitoring processes. However, the security of SSH keybased access has been largely ignored to date. This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.

Data Security Data Management, Security January 2016
Security-focused Standardized Architecture for NIST 800-53 on the AWS Cloud

The AWS security-focused standardized architecture solutions help streamline, automate, and implement secure baselines in AWS—from initial design to operational security readiness. They incorporate the expertise of AWS solutions architects, security and compliance personnel to help you build a secure and reliable architecture easily through automation.

This Quick Start includes AWS CloudFormation templates, which can be integrated with AWS Service Catalog, to automate building an approved reference architecture following your compliance requirements for NIST 800-53/RMF. It also includes a Security Control Responsibility Matrix (CRM), which maps security controls to architecture decisions, features, and configuration of the reference architecture. 

Data Security Data Management January 2016
CJIS Compliance on AWS

There is a long and successful track record of AWS customers using the AWS cloud for a wide range of sensitive federal and state government workloads, including Criminal Justice Information (CJI) data. Law enforcement customers (and partners who manage CJI) are taking advantage of AWS services to dramatically improve the security and protection of CJI data, using the advanced security services and features of AWS such as activity logging (AWS CloudTrail), encryption of data in motion and at rest (Amazon S3’s Server-Side Encryption with the option to bring your own key), comprehensive key management and protection (AWS Key Management Service and AWS CloudHSM), along with integrated permission management (IAM federated identity management, multi-factor authentication).

Data Security, CJIS Data Management, Security January 2016
Government and Public Sector Customer Engagement Optimization Solution Strategy

Customer engagement describes the level of interaction that individual customers have, either directly or indirectly, with a specific government or public sector organization over time. The term includes all of the interactions that occur along the customer journey, whether those “touches” happen before, during or after an interaction, and whether they occur by phone, online or in person. It can also include customer interactions that may be independent of specific transactions, such as criticisms in social media or comments posted on blogs.

Customer engagement should not be confused with customer experience, since engagement encompasses an ongoing relationship with a specific government or public sector organization, as opposed to an experience at a single point in time. It is also important to note that customer engagement is proactive. Government and public sector organizations do not have to wait for a customer to act before they engage—they can reach out to customers to renew permits and licenses, deliver personalized and location-specific services, and solicit feedback. Examples of proactive customer engagement tactics include surveys not tied to specific transactions or educational outreach programs. The idea is to build an ongoing dialog with customers that engenders familiarity and some level of emotional attachment to your services.

Customer Engagement Data Management December 2015
Digital First Engagement Management For Government and Public Sector

Government and public sector organizations continue to face unprecedented challenges as a result of the converging demands of the digital customer and the long-running global economic uncertainty.

In the past decade, government and public sector organizations took the first steps to exploiting the web as a way of “channel shifting” some of their popular services. Today, while organizations see digital channels as an important part of their digital customer engagement strategies, many are not fully realizing their expected benefits.

Data Sharing Data Management December 2015

Pages