The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
Next Generation 911 Self-Assessment Tool

The Next Generation 911 Self-Assessment Tool is a detailed, easy-to-use NG911 readiness checklist that is intended to help ECC/PSAP administrators and oversight personnel evaluate a system’s NG911 maturity state and understand the next steps necessary to continue NG911 deployment progress.

Download the Next Generation 911 Self-Assessment Tool

NG 911 Security December 2019
National Emergency Communications Plan (NECP) - Updated

DHS worked with stakeholders from federal, state, local, tribal, and territorial agencies, public safety associations, and the private sector to develop the National Emergency Communications Plan (NECP)—a strategic plan that establishes a national vision for the future state of emergency communications:

  • To enable the Nation’s emergency response community to communicate and share information securely across communications technologies in real time, including all levels of government, jurisdictions, disciplines, organizations, and citizens impacted by any threats or hazards event 
Emergency Communications Data Management, Communications September 2019
NENA NG9-1-1 Go-To Handbook

The purpose and scope of this document is to provide guidance to help 9-1-1 Authorities create a smooth, timely and efficient project management approach and transition plan to accomplish implementation of NG9-1-1.

NG9-1-1 Communications May 2019
A Comparison of Averted and Completed School Attacks from the Police Foundation Averted School Violence Database

The Police Foundation, in collaboration with the COPS Office, implemented the Averted School Violence (ASV) database to provide a platform for sharing information about averted incidents of violence in institutions of elementary, secondary, and higher education. As a companion to the preliminary report on the ASV database (Daniels 2018), this report compares 51 completed with 51 averted incidents of school violence from the ASV database and analyzes both sets. It includes findings on the demographics of individuals who plan attacks, victims' demographics in completed attacks, and community characteristics; it also provides important recommendations to minimize school violence and improve student and school safety.

School Security Security February 2019
Studying Drivers of Risk and Needs Assessment Instrument Implementation in Juvenile Justice

This bulletin describes Office of Juvenile Justice and Delinquency Prevention-supported research findings on factors that promote effective implementation of risk and needs assessment instruments in the juvenile justice system. Quality implementation has been shown to reduce reliance on formal system involvement and decrease recidivism.

Using a framework based in implementation science, the authors analyzed qualitative and quantitative data to identify the following drivers of successful implementation:

  • •Positive staff perceptions about the reliability, credibility, and applicability of the instrument to the needs of their local jurisdictions.
  • •Engagement of staff and other stakeholders in the initial strategic planning, goal setting, and problem solving to ensure early buy-in.
  • •A pilot period that focuses on training of staff and other stakeholders.
  • •Ongoing supervisory support and training.
  • •Standardized operating procedures and written policies in state and local agencies and the ability to share information across multiple stakeholders.
  • •A strong data infrastructure, including both user-friendly technological systems to support data collection and staff data expertise.


Delinquency Prevention Services December 2018
Platform Firmware Resiliency Guidelines (NIST.SP.800-193)

This document provides technical guidelines and recommendations supporting resiliency of platform firmware and data against potentially destructive attacks.  The platform is a collection of fundamental hardware and firmware components needed to boot and operate a system. The technical guidelines in this document promote resiliency in the platform by describing security mechanisms for protecting the platform against unauthorized changes, detecting unauthorized changes that occur, and recovering from attacks rapidly and securely.

Platform Firmware Security May 2018
Quick Start Guide for Populating Mobile Test Devices

This guide describes how to populate a mobile device as part of testing a mobile forensic tool.  It was built to be used with Federated Testing, but can also be used to populate a device for use with other test approaches.  The Federated Testing project is an expansion of the Computer Forensics Tool Testing (CFTT) Program at NIST which provides digital forensics investigators and labs with test materials for forensic tool testing. The goal of Federated Testing is to help digital forensics investigators to test the tools that they use in their labs and to enable sharing of tool test results within the digital forensics community. The goals of this guide are twofold: 1) provide guidance for how to populate (place test data on) a moblie device for use in forensic tool testing and 2) provide guidance to select data elements for inclusion that ensure effective testing.

Mobile Forensics Mobile/Portable Computing May 2018
DHS Cybersecurity Strategy

This strategy provides the Department with a framework to execute our cybersecurity responsibilities during the next five years to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient.

Cybersecurity Security May 2018
Framework for Improving Critical Infrastructure Cybersecurity version 1.1

Version 1.1 of this Cybersecurity Framework refines, clarifies, and enhances Version 1.0, which was issued in February 2014. It incorporates comments received on the two drafts of Version 1.1. Version 1.1 is intended to be implemented by first-time and current Framework users. Current users should be able to implement Version 1.1 with minimal or no disruption; compatibility with Version 1.0 has been an explicit objective.

Cyber Security Security April 2018
Fog Computing Conceptual Model

Managing the data generated by Internet of Things (IoT) sensors and actuators is one of the biggest challenges faced when deploying an IoT system.  Traditional cloud-based IoT systems are challenged by the large scale, heterogeneity, and high latency witnessed in some cloud ecosystems. One solution is to decentralize applications, management, and data analytics into the network itself using a distributed and federated compute model.  This approach has become known as fog computing.  This document presents the conceptual model of fog and mist computing and how they relate to cloud-based computing models for IoT.  This document further characterizes important properties and aspects of fog computing, including service models, deployment strategies, and provides a baseline of what fog computing is, and how it may be used.

Cloud Computing Data Management, Communications March 2018