The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|IoT-Enabled Smart City Framework||
Two barriers currently exist to effective and powerful smart city solutions. First, many current smart city ICT deployments are based on custom systems that are not interoperable, portable across cities, extensible, or cost-effective. Second, a number of architectural design efforts are currently underway (e.g. ISO/IEC JTC1, IEC, IEEE, ITU and consortia) but have not yet converged, creating uncertainty among stakeholders. There is a lack of consensus on both a common language/taxonomy and smart city architectural principles. The result is that these groups are likely to generate standards outputs, including standards that are divergent, perhaps even contradictory, which does not serve the global smart city community well.
|Data Interoperability||Data Management, Communications||February 2016|
|How Calgary Police Stores 1 Petabyte of Video Surveillance Data||
Quantum allows law enforcement agencies to invest more in other surveillance tools by saving money on storage.
|Data Security, Data Storage||Data Management||February 2016|
|Deploying Intelligent Storage for Video Surveillance and Physical Security||
The video surveillance industry is undergoing a significant transformation—it is much more than simply observing crimes. Challenges created by more cameras, higher resolutions, and increasingly complex analytics are creating an influx in data, and managing this infrastructure takes an intelligent, scalable storage platform. Quantum’s video surveillance data storage solution has the ability to tier storage, which will save you money without reducing video quality, retention time, or camera streams—allowing you to invest more in other tools needed to successfully keep people and property safe.
|Security, Data Storage||Data Management, Security||February 2016|
|Video Surveillance Storage: Enabling Infrastructure for Next Generation Security Systems||
Demand remains high for video surveillance solutions. In addition to the increasing volume of surveillance cameras shipped annually, technological advances mean each new generation of surveillance cameras benefit from improvements in image quality. Image quality is a complex matrix influenced by many different elements. Generally, improved image quality means greater data storage requirements. Whilst there are continuing advances in compression technologies providing a trade-off between image quality, bandwidth and storage requirements, these cannot completely mitigate the increase in data associated with higher quality video. Simply put, more storage and more compute is required to manage data from an increasing number of surveillance cameras capturing higher quality video.
|Security, Data Storage||Data Management, Security||February 2016|
|The Surveillance Infrastructure is Changing: How to Prepare for an Influx in Video||
Why Choosing the Right Surveillance Storage Matters.
|Data Security, Data Storage||Data Management, Security||February 2016|
|FirstNet Single Point of Contact by State||
Looking for your State’s FirstNet Contact? Click here to obtain the full list of FirstNet Contacts by State.
|FirstNet, Broadband, Data Communications||Communications||January 2016|
|Examining Electronic Monitoring Technologies||
Each year, millions of pretrial defendants and convicted offenders are supervised in their communities as they await trial or serve periods of probation or parole. Local and state agencies are increasingly using electronicmonitoring (EM) technologies to supplement supervision, tracking where offenders go and whether they are using alcohol or drugs.
Although recent studies have found that electronic monitoring is a promising tool for reducing recidivism and controlling corrections costs, questions remain about its effectiveness as an alternative to incarceration. The Pew Charitable Trusts recently interviewed five experts to get their perspectives on the uses, advantages, and disadvantages of EM technologies, as well as possible directions for future research.
|Electronic Monitoring||Data Management||January 2016|
|Kansas City, Missouri Smart Policing Initiative||
Kansas City, Missouri is a Midwestern city with a historically high rate of violent crime. Kansas City has a population of approximately 460,000 citizens who are distributed across some 319 square miles and who are served by the KCPD. Kansas City’s population is approximately 30 percent African-American and 10 percent Hispanic. Twelve percent of households are headed by single parents with children under age 18, and almost one-fifth of its citizens live below the poverty line. KCPD employs more than 1,400 sworn officers, the majority of whom are assigned to the Patrol Bureau, which operates across six patrol divisions.
The city has had a serious violent crime problem that overwhelmingly involves guns, and that is concentrated in the urban center. From 2010 through 2013, Kansas City ranked among the worst of the 50 largest cities in the United States for homicide, averaging more than 100 per year—for a rate of 22 per 100,000
A significant portion of the violent crime in Kansas City involved guns. From 2010 through 2014, 86.3 percent of all homicides and nearly half (42.1 percent) of all aggravated assaults were gunrelated. Notably, those homicides occurred in a geographically concentrated area. Of the 394 homicides in Kansas City from 2011 through 2014, 85.5 percent (n=337) had occurred in the Central, Metro and East Divisions of the city. This gun violence has persisted despite the fact that KCPD has recovered an average of 984.4 handguns per year in the Central, Metro, and East Divisions, alone.
|Security of Interactive and Automated Access Management Using Secure Shell (SSH)||
Users and hosts must be able to access other hosts in an interactive or automated fashion, often with very high privileges. This is necessary for a variety of reasons, including file transfers, disaster recovery, privileged access management, software and patch management, and dynamic cloud provisioning. Accessing other hosts is often accomplished using the Secure Shell (SSH) protocol. The SSH protocol supports several mechanisms for interactive and automated authentication. Management of this access requires proper provisioning, termination, and monitoring processes. However, the security of SSH keybased access has been largely ignored to date. This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.
|Data Security||Data Management, Security||January 2016|
|Security-focused Standardized Architecture for NIST 800-53 on the AWS Cloud||
The AWS security-focused standardized architecture solutions help streamline, automate, and implement secure baselines in AWS—from initial design to operational security readiness. They incorporate the expertise of AWS solutions architects, security and compliance personnel to help you build a secure and reliable architecture easily through automation.
This Quick Start includes AWS CloudFormation templates, which can be integrated with AWS Service Catalog, to automate building an approved reference architecture following your compliance requirements for NIST 800-53/RMF. It also includes a Security Control Responsibility Matrix (CRM), which maps security controls to architecture decisions, features, and configuration of the reference architecture.
|Data Security||Data Management||January 2016|