The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
A Cloud Roadmap: From Implementation to Innovation How a Complete Cloud Offers Agencies a Modern Approach to Cutting-Edge Service Delivery

The government IT infrastructure must evolve. The traditional approach to delivering IT services is proving incapable of keeping up with either the growing complexity of the IT enterprise or the increasing demand for innovation. This pressure to provide an infrastructure that is more manageable, scalable and flexible is pushing government agencies to accelerate their adoption of cloud solutions.

Until recently, government agencies have been slow to move to the cloud. In 2011, the Office of Management and Budget (OMB) issued its “Cloud First” policy, which directed agencies to adapt their IT strategies to take full advantage of the cloud. Yet a September 2014 report from the U.S. Government Accountability Office found that at seven major agencies, investments in the cloud accounted for a mere two percent of IT budgets. Collectively, the agencies consider cloud services for only 33 percent of their IT investments.

Cloud Data Management May 2016
Mapping Government’s Journey to the Cloud: 8 Success Stories

The early years of cloud adoption in government were marked by curiosity and skepticism about delivering secure IT-asa-Service, but time has proved that cloud has enormous potential to improve government service delivery. Agencies are discovering they can simplify their IT, and improve back-office business functions like procurement and HR, while often reducing costs. The first step to starting your cloud journey is to ask three questions:

  • Why do we want to move to the cloud?
  • What functions do we want to move?
  • How do we make the change?
Cloud Services Data Management May 2016
Smart Cities Readiness Guide

The first goal of the Readiness Guide is to give you a “vision” of a smart city, to help you understand how technology will transform the cities of tomorrow.

The second goal is to help you construct your own roadmap to that future. It suggests the goals to which you should aspire, the features and functions you should specify, the best practices that will gain you the maximum benefits for the minimum cost, at reduced risk.

The Readiness Guide is intended for mayors, city managers, city planners and their staffs. It helps cities help themselves by providing objective, vendor-neutral information to make confident, educated choices about the technologies that can transform a city.

Smart Cities Data Management, Security April 2016
Public Safety Analytics R&D Roadmap

The public safety community is in a period of great transition. Over the next 20 years, technology advancements will increase accessibility of data/video applications to public safety, and allow for the eventual migration of voice communications from disparate Land Mobile Radio (LMR) networks to a nationwide Long Term Evolution (LTE) broadband network, the Nationwide Public Safety Broadband Network (NPSBN). Emerging technologies within this new infrastructure present opportunities and challenges for public safety, and the process of modernizing responder communications requires significant coordination and planning. To facilitate the transition from LMR to LTE, the Public Safety Communications Research (PSCR) program initiated a research and development (R&D) planning process to determine what technology investments are of highest priority to the public safety community.

Communications Communications April 2016
What is Application Security?

Every enterprise’s application landscape is now both business critical and rapidly expanding.

Mobile and cloud computing are dramatically changing the way we do business. Today, the world runs on applications, and, as a result, every company is becoming a software company – regardless of its primary business. Even GE now considers itself a software company. 

And enterprises are producing these applications faster than ever before, often using Agile development processes and then augmenting their internal development programs with third-party software and open source libraries and components. 

How can organizations ensure the security of their critical and fluid application landscapes? That’s where application security comes in. 

Data Security Data Management, Security April 2016
A State Government Protects Citizen Data by Securing Applications

A state government, facing concerns from citizens over data breaches and concerned about federal requirements such as HIPAA, implemented a high priority initiative on cybersecurity. Recognizing the importance of application security as part of an overall cybersecurity approach (including security training and data loss prevention technology), the state’s CIO brought in Veracode to provide an application security governance program that could be easily rolled out across multiple state agencies. 

With Veracode’s cloud-based service and policy-based approach, the state has assessed 200 applications across 14 state agencies in the first year of the program, fixing over 28,000 flaws and achieving a 77% pass rate on the state’s application security policy. Additionally, the state has begun requiring vendors to meet the application security standards as well. 

Data Security Data Management, Security April 2016
Making the Case for FBI-CJIS Security Policy

The Federal Bureau of Investigation (FBI) created the FBI-Criminal Justice Information Services Division Security Policy (FBI-CJIS Security Policy) to provide authorized agencies with a security management structure for accessing, protecting and safeguarding Criminal Justice Information (CJI) accessed or received from the FBICJIS system of services. While FBI-CJIS security policy compliance is not a certification or a cyber-rubber stamp of approval from the FBI, it does provide a security framework and foundation that enables government agencies to evaluate their own networks and procedures, as well as those of private contractors, service providers and cloud providers. 

For agencies evaluating third parties, FBI-CJIS compliance is not a one-way street. It requires a unique partnership between the agency customer and the contractor/vendor/cloud provider to
assess the products and services.

Data Security Data Management, Security April 2016
JCAT Joint Counterterrorism Assessment Team Intelligence Guide for First Responders

In the post-9/11 era, first responders have incorporated protecting the Homeland against terrorism into their daily mission. Law enforcement, fire service, and emergency medical services personnel play a vital role in detecting and preventing attacks because of the nature of their work, their frequent interaction with members of the public, and the level of access their jobs provide. People who hold these jobs often can identify behaviors or activities that could signal a pending terrorist attack; therefore, public safety personnel must continue to report, according to the Nationwide Suspicious Activity Reporting Initiative, observations that raise reasonable suspicion.

The Intelligence Community routinely produces information for public safety personnel that may help first responders identify terrorist-related activities and prevent, deter, or respond to
terrorist attacks. You can obtain this information through existing joint partnerships and from Internet-based U.S. Government information-sharing systems. It is critical that first responders, who are entrusted with keeping our citizens safe, be able to access, understand, and use this information.

Data Security Data Management March 2016
Creating a Digital-First, Citizen-Centric Engagement Strategy

Public sector agencies know they must go digital to better serve citizens, but oftentimes even their best-laid plans fall short. Digital-first strategies can be hard to implement because government agencies must integrate disconnected technologies to be successful. Verint can help with its Digital First engagement management solution, which combines customer relationship management, Web content management and an enterprise search tool.

Data Sharing, Data Interoperability Data Management March 2016
Why Law Enforcement Should Consider a Multi-Tier Storage Approach

Too often law enforcement professionals are required to make important decisions under time and fiscal restraints. This has led to many project-based technology decisions. In fact, with the influx of agencies adopting body-worn technology coupled with the future of adoptions under Obama’s $75 million Federal Match program, agencies will have the ability to deploy these community-supported, liability-reducing technologies. Unfortunately, what is not being taken into account is the big picture view where body cams are just one important element of an officer’s workflow and evidence management. Video data becomes part of the unified chain of evidence. When needed for a case,everyone involved—from the officer to forensic analysts to prosecutors—needs to be able to find and access the information quickly and easily. Storage also needs to adhere to specific regulations applicable to all criminal justice information (CJI). Recently, the International Association of Chiefs of Police (IACP) recommended agencies adopt storage solutions meeting the FBI’s Criminal Justice Information Services (CJIS) guidelines. At the same time, officers need to be free to focus on their mission of protecting people and property. This is where purpose-built architecture is important.

Data Storage Data Management March 2016