The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Titlesort ascending Summary Subject Category Date Published
Wisconsin State Patrol Tests New Path to Radio Interoperability

By the National Institute of Justice - April 2010
The Wisconsin State Patrol, which oversees traffic incidents and state voice and mobile communications networks, has developed a strategy for adopting Project 25 (P25) radio interoperability standards for digital, two-way wireless communications products. WSP ran a four-site pilot program that exposed pitfalls of migrating to P25, namely the varying terminology, settings, and software provided by the manufacturers, and identified ways to improve implementation through collaboration between law enforcement agencies and vendors during product development and installation phases. P25-compliant products enable radios to communicate in analog mode with legacy radios and in either analog or digital mode with other P25 radios. P25 products can be upgraded gradually, as funding and time allow.

Interoperability Communications March 2010
WideBridge: Bridging the Gap to Provide Mission-Critical Broadband Services for Public Safety

WideBridge: Bridging the Gap to Provide Mission-Critical Broadband Services for Public Safety

  • End-to-End Secure Communications
  • Certified Data Channel (NSA, NIST FIPS 140-2)
  • Broadband and Legacy CNR Systems Support
Communications Communications February 2016
WideBridge Explained

WideBridgeTM is designed to provide public safety first responders with the next evolution in secure, standards-based mission-critical communications leveraging Land Mobile Radio with LTE cellular networks and Smartphones for situational awareness and information sharing to keep communities safe and save lives. WideBridge is a part of the SmartResponderTM solution family.

Communications Interoperability Communications February 2016
Why Law Enforcement Should Consider a Multi-Tier Storage Approach

Too often law enforcement professionals are required to make important decisions under time and fiscal restraints. This has led to many project-based technology decisions. In fact, with the influx of agencies adopting body-worn technology coupled with the future of adoptions under Obama’s $75 million Federal Match program, agencies will have the ability to deploy these community-supported, liability-reducing technologies. Unfortunately, what is not being taken into account is the big picture view where body cams are just one important element of an officer’s workflow and evidence management. Video data becomes part of the unified chain of evidence. When needed for a case,everyone involved—from the officer to forensic analysts to prosecutors—needs to be able to find and access the information quickly and easily. Storage also needs to adhere to specific regulations applicable to all criminal justice information (CJI). Recently, the International Association of Chiefs of Police (IACP) recommended agencies adopt storage solutions meeting the FBI’s Criminal Justice Information Services (CJIS) guidelines. At the same time, officers need to be free to focus on their mission of protecting people and property. This is where purpose-built architecture is important.

Data Storage Data Management March 2016
White House Report: Securing the Homeland Strengthening the Nation

A new wave of terrorism, involving new weapons, looms in America’s future. It is a challenge unlike any ever faced by our Nation. But we are not daunted. We possess the resources and the determination to defeat our enemies and work to secure our homeland against the threats they pose.

Homeland Security Report Data Management February 2002
What is Application Security?

Every enterprise’s application landscape is now both business critical and rapidly expanding.

Mobile and cloud computing are dramatically changing the way we do business. Today, the world runs on applications, and, as a result, every company is becoming a software company – regardless of its primary business. Even GE now considers itself a software company. 

And enterprises are producing these applications faster than ever before, often using Agile development processes and then augmenting their internal development programs with third-party software and open source libraries and components. 

How can organizations ensure the security of their critical and fluid application landscapes? That’s where application security comes in. 

Data Security Data Management, Security April 2016
What Are the Feds Doing Anyhow?

What's the funding picture for FY 2010 going to look like? What impact will our country's economic woes have on grant funding programs next year? Have these politically charged times changed the approach the Federal Government will take to provide state and local justice and public safety grant assistance? In the September/October 2009 edition of Public Safety IT Magazine, CJIS GROUP partner, Gary Cooper, looks at potential FY 2010 DOJ and DHS state and local grant appropriations.

Funding Uncategorized September 2009
Voice, Video and Broadband: The Changing Competitive Landscape and Its Impact on Consumers

Industry executives, economists, analysts, and local government officials offer a variety of perspectives on competition among providers of video programming delivery, local telephony, and broadband services.

Telecommunications Industry Developments Communications October 2008
VMware K-12 Education Secure Online Testing Solution

Is your school district prepared to securely deliver state assessments that comply with the Common Core State Standards Initiative? Leveraging VMware Horizon to deliver online tests in a virtual desktop environment ensures compliance with PARCC and Smarter Balanced technical and security requirements while giving IT the flexibility to optimize use of computing resources. Security and privacy of student information is maintained while test integrity is preserved.


Sponsored by CarahSoft

Education, Data Security Data Management September 2015
Video Surveillance Storage: Enabling Infrastructure for Next Generation Security Systems

Demand remains high for video surveillance solutions. In addition to the increasing volume of surveillance cameras shipped annually, technological advances mean each new generation of surveillance cameras benefit from improvements in image quality. Image quality is a complex matrix influenced by many different elements. Generally, improved image quality means greater data storage requirements. Whilst there are continuing advances in compression technologies providing a trade-off between image quality, bandwidth and storage requirements, these cannot completely mitigate the increase in data associated with higher quality video. Simply put, more storage and more compute is required to manage data from an increasing number of surveillance cameras capturing higher quality video.

Security, Data Storage Data Management, Security February 2016