The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Next Generation 911 Self-Assessment Tool||
The Next Generation 911 Self-Assessment Tool is a detailed, easy-to-use NG911 readiness checklist that is intended to help ECC/PSAP administrators and oversight personnel evaluate a system’s NG911 maturity state and understand the next steps necessary to continue NG911 deployment progress.
|NG 911||Security||December 2019|
|National Emergency Communications Plan (NECP) - Updated||
DHS worked with stakeholders from federal, state, local, tribal, and territorial agencies, public safety associations, and the private sector to develop the National Emergency Communications Plan (NECP)—a strategic plan that establishes a national vision for the future state of emergency communications:
|Emergency Communications||Data Management, Communications||September 2019|
|NENA NG9-1-1 Go-To Handbook||
The purpose and scope of this document is to provide guidance to help 9-1-1 Authorities create a smooth, timely and efficient project management approach and transition plan to accomplish implementation of NG9-1-1.
|A Comparison of Averted and Completed School Attacks from the Police Foundation Averted School Violence Database||
The Police Foundation, in collaboration with the COPS Office, implemented the Averted School Violence (ASV) database to provide a platform for sharing information about averted incidents of violence in institutions of elementary, secondary, and higher education. As a companion to the preliminary report on the ASV database (Daniels 2018), this report compares 51 completed with 51 averted incidents of school violence from the ASV database and analyzes both sets. It includes findings on the demographics of individuals who plan attacks, victims' demographics in completed attacks, and community characteristics; it also provides important recommendations to minimize school violence and improve student and school safety.
|School Security||Security||February 2019|
|Studying Drivers of Risk and Needs Assessment Instrument Implementation in Juvenile Justice||
This bulletin describes Office of Juvenile Justice and Delinquency Prevention-supported research findings on factors that promote effective implementation of risk and needs assessment instruments in the juvenile justice system. Quality implementation has been shown to reduce reliance on formal system involvement and decrease recidivism.
Using a framework based in implementation science, the authors analyzed qualitative and quantitative data to identify the following drivers of successful implementation:
|Delinquency Prevention||Services||December 2018|
|Platform Firmware Resiliency Guidelines (NIST.SP.800-193)||
This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks. The platform is a collection of fundamental hardware and firmware components needed to boot and operate a system. The technical guidelines in this document promote resiliency in the platform by describing security mechanisms for protecting the platform against unauthorized changes, detecting unauthorized changes that occur, and recovering from attacks rapidly and securely.
|Platform Firmware||Security||May 2018|
|Quick Start Guide for Populating Mobile Test Devices||
This guide describes how to populate a mobile device as part of testing a mobile forensic tool. It was built to be used with Federated Testing, but can also be used to populate a device for use with other test approaches. The Federated Testing project is an expansion of the Computer Forensics Tool Testing (CFTT) Program at NIST which provides digital forensics investigators and labs with test materials for forensic tool testing. The goal of Federated Testing is to help digital forensics investigators to test the tools that they use in their labs and to enable sharing of tool test results within the digital forensics community. The goals of this guide are twofold: 1) provide guidance for how to populate (place test data on) a moblie device for use in forensic tool testing and 2) provide guidance to select data elements for inclusion that ensure effective testing.
|Mobile Forensics||Mobile/Portable Computing||May 2018|
|DHS Cybersecurity Strategy||
This strategy provides the Department with a framework to execute our cybersecurity responsibilities during the next five years to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient.
|Framework for Improving Critical Infrastructure Cybersecurity version 1.1||
Version 1.1 of this Cybersecurity Framework refines, clarifies, and enhances Version 1.0, which was issued in February 2014. It incorporates comments received on the two drafts of Version 1.1. Version 1.1 is intended to be implemented by first-time and current Framework users. Current users should be able to implement Version 1.1 with minimal or no disruption; compatibility with Version 1.0 has been an explicit objective.
|Cyber Security||Security||April 2018|
|Fog Computing Conceptual Model||
Managing the data generated by Internet of Things (IoT) sensors and actuators is one of the biggest challenges faced when deploying an IoT system. Traditional cloud-based IoT systems are challenged by the large scale, heterogeneity, and high latency witnessed in some cloud ecosystems. One solution is to decentralize applications, management, and data analytics into the network itself using a distributed and federated compute model. This approach has become known as fog computing. This document presents the conceptual model of fog and mist computing and how they relate to cloud-based computing models for IoT. This document further characterizes important properties and aspects of fog computing, including service models, deployment strategies, and provides a baseline of what fog computing is, and how it may be used.
|Cloud Computing||Data Management, Communications||March 2018|