The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
Blue Ribbon Commission Urges Next President to Strengthen Cybersecurity Efforts in First 100 Days

To protect and continue to expand the digital economy, the next U.S. president must strengthen collaboration between the public and private sectors before, during and after cybersecurity events, according to a new report released today by a blue ribbon Presidential Commission.

“When it comes to cybersecurity, organizations cannot operate in isolation. It is impossible to stop all attacks. Resilience must be a core component of any cybersecurity strategy,” the commissioners said in their report.

The Commission on Enhancing National Cybersecurity was established by President Obama (Executive Order 13718 (link is external)) with the explicit purpose of making recommendations to strengthen cybersecurity in both the public and private sectors.

The 90-page report emphasizes the need for partnerships between the public and private sectors, as well as international engagement. It also discusses the role consumers must play in enhancing our digital security. The report categorizes its recommendations within six overarching imperatives focused on infrastructure, investment, consumer education, workforce capabilities, government operations, and requirements for a fair and open global digital economy.

Cybersecurity Data Management, Security December 2016
Forensic Optical Topography - A Landscape Study

The National Institute of Justice’s (NIJ’s) Forensic Technology Center of Excellence (FTCoE) at RTI International directed this landscape study of optical topography instrument for implementation in forensic practice with input from law enforcement, crime laboratories, research scientists, and practitioners in the criminal justice community. A landscape study, in concept, is designed to provide a comprehensive list of market participants, their products, and product features to enable better informed decisions by end users. This report provides a landscape view of currently available optical topography systems for firearms identification. It is intended to provide forensic laboratory directors, practitioners, and stakeholders with a survey of commercial systems and a basic introduction to the technology. 

Optical topography systems for firearms identification Data Management December 2016
Smart Cities: Wireless Connectivity Enhances AMI/Smart Meter Project

Smart meter technology provides utilities with significant operational and customer service benefits. In 2014, Memphis Light, Gas & Water (MLGW) began deploying an advanced metering infrastructure (AMI) and smart meters to enhance services for its 425,000 customers. 

MLGW, a division of the City of Memphis, is the largest three-service municipal utility in the U.S. Since 1939, MLGW has provided electricity, natural gas, and water services for 425,000 residents and businesses in Memphis and adjoining Shelby County, covering a 768 square mile operating area. To better capture customer billing data and to streamline operations, MLGW is installing electric, gas and water smart meters at customer premises throughout its territory.

Wireless Connectivity Data Management November 2016
Public Safety Primer on Cloud Technology

The purpose of this resource is to educate the public safety community and provide answers to straightforward common questions public safety agencies may have regarding cloud technology, the services the cloud can provide, and guidance for considering contracts with cloud vendors. In addition, this resource provides a glossary of definitions for terms used throughout the document, as well as a list of recommended resources for further reading. It is intended to provide introductory guidance to agencies, not to be an exhaustive “how-to” guide.
This guidance is the result of a collaborative effort through the Global Justice Information Sharing Initiative (Global), which is supported by the Bureau of Justice Assistance, Office
of Justice Programs, U.S. Department of Justice. Global acknowledges that this document does not address all subject areas of this complex topic; rather, it provides a strong understanding of cloud technology to help guide government leaders. Global is committed to educating law enforcement and public safety agencies on such matters.

Cloud Services Data Management November 2016
State CIO Top Ten Priorities for 2017

NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The CIOs top ten priorities are identified and used as input to NASCIO's programs, planning for conference sessions, and publications.

Policy and Technology Issues for State Government Uncategorized November 2016
A Comprehensive Report on School SafetyTechnology

Under cooperative agreement, NIJ tasked the National Criminal Justice Technology Research, Test and Evaluation (RT&E) Center at Johns Hopkins University to undertake a comprehensive assessment of how technology is currently used in the United States and in other countries to prevent and respond tocriminal acts of violence in K-12 schools, both public and private.

The resulting report, entitled “A Comprehensive Review of School Safety Technologies,” is intended to be used by a range of audiences, including school administrators, security directors, principals, and others. It features four research components—a literature review, a technology review, case studies, and a legal review. It examines the technologies currently being used, how they are used, how those technologies were chosen, and how well they are working. By providing this context, school officials can make informed decisions about technology choices that can increase the safety of school children, faculty, and staff.

School Safety Security October 2016
The Intelligence-Driven Prosecution Model

The Intelligence-Driven Prosecution Model: A Case Study in the New York County District Attorney’s Office.

The Intelligence-Driven Prosecution Model (IDPM), designed and implemented by the New York County District Attorney’s Office (DANY), is a prosecutorial strategy rooted in the rigorous collection of background information about the people, places, and problems driving crime in specific neighborhoods.  Through enhanced information gathering—including close coordination with local law enforcement and robust community outreach—the IDPM intends to facilitate improved prosecutorial decision making.  Technology-centered intelligence collection that focuses on specific people and places driving crime adds a unique dimension to data analysis.  With funding from the U.S. Department of Justice’s Bureau of Justice Assistance, a study was conducted to document how the IDPM operates and explore the model’s implementation and effects in New York County, known more widely as the borough of Manhattan.

Enhanced information gathering and improved prosecutorial decision making Data Management September 2016
CASE STUDY: Douglas County Sheriff's Office

When the Douglas County Sheriff’s Office found out that the solution they relied on for critical communications was being discontinued and would no longer be supported, they needed to find an alternative—and fast. The county supports a dispatch center, a jail, a courthouse, patrol units, medical units, and several area fire departments. Getting detailed messages to staff at each location and on patrol about developing situations is vital to staff’s personal security and to well-coordinated public safety response. And the dispatch center frequently sends communications to external groups and individuals, with notifications of events such as system outages and technology interruptions. The hunt for a new solution was on.

Public Safety Solutions Data Management, Communications August 2016
NIST’s Network-of-Things Model Builds Foundation to Help Define the Internet of Things

Examples of IoT systems include a smart electric grid, a home controlled by sensors, self-driving cars, smart factories, and heart health monitors.

But what is the IoT? There are many ways to describe the IoT. More than 20 professional and research groups have worked to characterize the IoT, but so far there is not one universally accepted definition. Despite that, the International Data Corporation predicts the global market for IoT solutions to grow to $1.7 trillion by 2020. After studying the recent attempts to define the IoT, NIST computer scientist Jeff Voas determined that “there is no formal, analytic or even descriptive set of building blocks that govern the operation, trustworthiness and lifecycle of IoT components,” according to his introduction in the just-released NIST publication, Networks of ‘Things.’

IoT Data Management, Security July 2016
CASE STUDY: Carroll County State’s Attorney’s Office

When the Carroll County State’s Attorney’s Office in Westminster, Maryland, was looking for a case management solution, they faced many challenges.  Not only did they need a program to manage their growing case load, they were facing the imminent demise of an outdated court system.  With the District and Circuit Court data changing format, resolution was imperative.  

The needs of the office included a convenient means to communicate with the Courts, a database conversion, annually updated Maryland charge codes, customized templates and reports and over 20 enhancements to ensure that the system was scalable and operable for years to come. Fortunately, Judicial Dialog Systems was perfectly positioned to meet the challenges.

Case Management Data Management July 2016