Publications

The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.

Title Summary Subject Category Date Publishedsort ascending
IoT-Enabled Smart City Framework

Two barriers currently exist to effective and powerful smart city solutions. First, many current smart city ICT deployments are based on custom systems that are not interoperable, portable across cities, extensible, or cost-effective. Second, a number of architectural design efforts are currently underway (e.g. ISO/IEC JTC1, IEC, IEEE, ITU and consortia) but have not yet converged, creating uncertainty among stakeholders. There is a lack of consensus on both a common language/taxonomy and smart city architectural principles. The result is that these groups are likely to generate standards outputs, including standards that are divergent, perhaps even contradictory, which does not serve the global smart city community well. 

Data Interoperability Data Management, Communications February 2016
How Calgary Police Stores 1 Petabyte of Video Surveillance Data

Quantum allows law enforcement agencies to invest more in other surveillance tools by saving money on storage.

Data Security, Data Storage Data Management February 2016
Deploying Intelligent Storage for Video Surveillance and Physical Security

The video surveillance industry is undergoing a significant transformation—it is much more than simply observing crimes. Challenges created by more cameras, higher resolutions, and increasingly complex analytics are creating an influx in data, and managing this infrastructure takes an intelligent, scalable storage platform. Quantum’s video surveillance data storage solution has the ability to tier storage, which will save you money without reducing video quality, retention time, or camera streams—allowing you to invest more in other tools needed to successfully keep people and property safe.

Security, Data Storage Data Management, Security February 2016
Video Surveillance Storage: Enabling Infrastructure for Next Generation Security Systems

Demand remains high for video surveillance solutions. In addition to the increasing volume of surveillance cameras shipped annually, technological advances mean each new generation of surveillance cameras benefit from improvements in image quality. Image quality is a complex matrix influenced by many different elements. Generally, improved image quality means greater data storage requirements. Whilst there are continuing advances in compression technologies providing a trade-off between image quality, bandwidth and storage requirements, these cannot completely mitigate the increase in data associated with higher quality video. Simply put, more storage and more compute is required to manage data from an increasing number of surveillance cameras capturing higher quality video.

Security, Data Storage Data Management, Security February 2016
The Surveillance Infrastructure is Changing: How to Prepare for an Influx in Video

Why Choosing the Right Surveillance Storage Matters.

Data Security, Data Storage Data Management, Security February 2016
FirstNet Single Point of Contact by State

Looking for your State’s FirstNet Contact? Click here to obtain the full list of FirstNet Contacts by State.

FirstNet, Broadband, Data Communications Communications January 2016
Examining Electronic Monitoring Technologies

Each year, millions of pretrial defendants and convicted offenders are supervised in their communities as they await trial or serve periods of probation or parole. Local and state agencies are increasingly using electronicmonitoring (EM) technologies to supplement supervision, tracking where offenders go and whether they are using alcohol or drugs.

Although recent studies have found that electronic monitoring is a promising tool for reducing recidivism and controlling corrections costs, questions remain about its effectiveness as an alternative to incarceration. The Pew Charitable Trusts recently interviewed five experts to get their perspectives on the uses, advantages, and disadvantages of EM technologies, as well as possible directions for future research.

Electronic Monitoring Data Management January 2016
Kansas City, Missouri Smart Policing Initiative

Kansas City, Missouri is a Midwestern city with a historically high rate of violent crime. Kansas City has a population of approximately 460,000 citizens who are distributed across some 319 square miles and who are served by the KCPD. Kansas City’s population is approximately 30 percent African-American and 10 percent Hispanic. Twelve percent of households are headed by single parents with children under age 18, and almost one-fifth of its citizens live below the poverty line. KCPD employs more than 1,400 sworn officers, the majority of whom are assigned to the Patrol Bureau, which operates across six patrol divisions. 

The city has had a serious violent crime problem that overwhelmingly involves guns, and that is concentrated in the urban center. From 2010 through 2013,  Kansas City ranked among the worst of the 50 largest cities in the United States for homicide, averaging more than 100 per year—for a rate of 22 per 100,000
residents, which is four times the national average. Kansas City’s violent crime rate in 2012 was equally dismal—2,476 aggravated assaults were reported, a significant increase from 2010 (n=2,371) and 2011 (n=2,274). There were 1,617 robberies in 2010, but in 2011, 2012, and 2013, totals rose to 1,673, 1,645, and 1,716, respectively.

A significant portion of the violent crime in Kansas City involved guns. From 2010 through 2014, 86.3 percent of all homicides and nearly half (42.1 percent) of all aggravated assaults were gunrelated. Notably, those homicides occurred in a geographically concentrated area. Of the 394 homicides in Kansas City from 2011 through 2014, 85.5 percent (n=337) had occurred in the Central, Metro and East Divisions of the city. This gun violence has persisted despite the fact that KCPD has recovered an average of 984.4 handguns per year in the Central, Metro, and East Divisions, alone.

Security Security January 2016
Security of Interactive and Automated Access Management Using Secure Shell (SSH)

Users and hosts must be able to access other hosts in an interactive or automated fashion, often with very high privileges. This is necessary for a variety of reasons, including file transfers, disaster recovery, privileged access management, software and patch management, and dynamic cloud provisioning. Accessing other hosts is often accomplished using the Secure Shell (SSH) protocol. The SSH protocol supports several mechanisms for interactive and automated authentication. Management of this access requires proper provisioning, termination, and monitoring processes. However, the security of SSH keybased access has been largely ignored to date. This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.

Data Security Data Management, Security January 2016
Security-focused Standardized Architecture for NIST 800-53 on the AWS Cloud

The AWS security-focused standardized architecture solutions help streamline, automate, and implement secure baselines in AWS—from initial design to operational security readiness. They incorporate the expertise of AWS solutions architects, security and compliance personnel to help you build a secure and reliable architecture easily through automation.

This Quick Start includes AWS CloudFormation templates, which can be integrated with AWS Service Catalog, to automate building an approved reference architecture following your compliance requirements for NIST 800-53/RMF. It also includes a Security Control Responsibility Matrix (CRM), which maps security controls to architecture decisions, features, and configuration of the reference architecture. 

Data Security Data Management January 2016

Pages