The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|DHS S&T Cyber Security Division 2018 Portfolio Guide||
The DHS Science & Technology, Cyber Security Division, 2018 Portfolio Guide presents in-depth summaries of S&T’s various cybersecurity R&D program areas—from Cyber for Critical Infrastructure to Cyber Physical System Security. In all, the guide delivers 15 insightful overviews—including one about the DHS Silicon Valley Innovation Program—encompassing the totality of S&T’s broad cybersecurity research portfolio.
|Cyber Security||Security||March 2018|
|DHS S&T Cyber Security Division Technology Guide 2018||
The DHS Science & Technology (S&T) Cyber Security Division, Technology Guide focuses on individual S&T research efforts to provide stakeholders an insider’s look at more than 70 mature, S&T-funded R&D technologies and solutions plus Transition to Practice technologies that are ready for adoption and marketplace transition. The technologies presented are from research project areas such as Software Assurance, Mobile Security, Identity Management, Distributed Denial of Service Defense, Data Privacy, Cyber Competitions, Cyber Forensics and more.
|Cyber Security||Security||March 2018|
|National Association of State Budget Officers (NASBO) Spring 2017 Fiscal Survey of States||
The Fiscal Survey of States is published twice annually by the National Association of State Budget Officers (NASBO). The survey presents aggregate and individual data on the states' general fund receipts, expenditures, and balances. These general funds are used to finance most broad-based state services and are the most important elements in determining the fiscal health of the states.
|State Budgets||Uncategorized||July 2017|
|Challenges & Trends in Public Sector IT Operations: United States||
Public sector organizations are feeling the pains of digital transformation. Faced with modernization, data center upgrades and continuous cloud-first initiatives, this transformation of the IT environment is making it a challenge to deliver services, comply with service level agreements (SLAs), meet citizens’ expectations and achieve organizational missions.
Challenges & Trends in Public Sector IT Operations: the United States, a research study conducted by the Ponemon Institute and sponsored by Splunk of 1,227 decision makers and operations staff across federal, state and local governments, higher education and federal systems integrators and aerospace and defense industries, reveals that digital transformation is well underway with budgets shifting from traditional on premise investments to more cloud and agile development paradigms.
|Public Sector IT Operations||Uncategorized||July 2017|
|Criminal Justice Information Services (CJIS) Security Policy (v5.6)||
Law enforcement needs timely and secure access to services that provide data wherever andwhenever for stopping and reducing crime. In response to these needs, the Advisory Policy Board(APB) recommended to the Federal Bureau of Investigation (FBI) that the Criminal JusticeInformation Services (CJIS) Division authorize the expansion of the existing security managementstructure in 1998.Administered through a shared management philosophy, the CJIS SecurityPolicy contains information security requirements, guidelines, and agreements reflecting the willof law enforcement and criminal justice agencies for protecting the sources, transmission, storage,and generation of Criminal Justice Information (CJI).The Federal Information SecurityManagement Act of 2002 provides further legal basis for the APB approved management,operational, and technical security requirements mandated to protect CJI and by extension thehardware, software and infrastructure required to enable the services provided by the criminaljustice community.
|Data Security||Security||June 2017|
|2017 SAFECOM Strategic Plan||
The SAFECOM Strategic Plan and Implementation Guide is a stakeholder-driven plan that aims to enhance operability and interoperability for public safety communications through the education of the community, decision makers, and elected officials on short- and mid-term priorities and their associated annual products and activities.
The Plan also provides clarification on SAFECOM’s strategies to prioritize resources, strengthen governance, identify future investments, and address interoperability gaps over the long term. Additionally, this Plan:
|Public Safety Interoperability||Communications||March 2017|
|License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities||
To support justice entities in their efforts to implement License Plate Reader (LPR) policies and procedures, this policy development template was developed by state, local, and federal law enforcement and criminal justice partners and is designed to assist justice entity personnel—whether in a law enforcement or homeland security agency, a fusion center, or an intelligence unit—in developing a comprehensive LPR policy.
|License Plate Readers||Mobile/Portable Computing||March 2017|
|Report on Lightweight Cryptography||
NIST-approved cryptographic standards were designed to perform well on general-purpose computers. In recent years, there has been increased deployment of small computing devices that have limited resources with which to implement cryptography. When current NIST-approved algorithms can be engineered to fit into the limited resources of constrained environments, their performance may not be acceptable. For these reasons, NIST started a lightweight cryptography project that was tasked with learning more about the issues and developing a strategy for the standardization of lightweight cryptographic algorithms. This report provides an overview of the lightweight cryptography project at NIST, and describes plans for the standardization of lightweight cryptographic algorithms
|Constrained devices; lightweight cryptography; standardization||Security||March 2017|
|North American Grid Modernization Test Bed Survey||
Smart grid test beds are a critical resource for developing and testing new technologies in a controlled and economic fashion. They help our industry avoid the consequences of deploying unproven technology at scale by a utility or grid operator. SGIP’s Grid Modernization Test Bed survey was created to foster collaboration among industry players who are engaged in such research and testing. The North American Grid Modernization Test Bed Survey is a high-level look at who is doing what in this realm of study. This is not an inclusive look at all the research underway, but it does include some of the biggest, most important grid modernization sites in North America.
|Grid Modernization||Data Management, Communications||February 2017|
|Fostering Innovation in Community and Institutional Corrections: Identifying High-Priority Technology and Other Needs||
The agencies of the U.S. corrections enterprise manage offenders confined in prisons and jails and those who have been released into the community on probation and parole. To better achieve its objectives and play its role within the criminal justice enterprise, the sector needs innovation in corrections technology, policy, and practice. This report draws on published literature and new structured deliberations of a practitioner Corrections Advisory Panel to frame an innovation agenda. It identifies and prioritizes potential improvements in technology, policy, and practice in both community and institutional corrections.
|Corrections Technology||Uncategorized||February 2017|