The CJIS GROUP Publications resource contains reports pertaining to technology in the Criminal Justice, Public Safety, Homeland Security, and Health and Human Services communities. Documents are generally gathered through the public domain and include industry trends, agency surveys, technical standards and models, case studies, white papers, and guides.
|Deploying Intelligent Storage for Video Surveillance and Physical Security||
The video surveillance industry is undergoing a significant transformation—it is much more than simply observing crimes. Challenges created by more cameras, higher resolutions, and increasingly complex analytics are creating an influx in data, and managing this infrastructure takes an intelligent, scalable storage platform. Quantum’s video surveillance data storage solution has the ability to tier storage, which will save you money without reducing video quality, retention time, or camera streams—allowing you to invest more in other tools needed to successfully keep people and property safe.
|Security, Data Storage||Data Management, Security||February 2016|
|Video Surveillance Storage: Enabling Infrastructure for Next Generation Security Systems||
Demand remains high for video surveillance solutions. In addition to the increasing volume of surveillance cameras shipped annually, technological advances mean each new generation of surveillance cameras benefit from improvements in image quality. Image quality is a complex matrix influenced by many different elements. Generally, improved image quality means greater data storage requirements. Whilst there are continuing advances in compression technologies providing a trade-off between image quality, bandwidth and storage requirements, these cannot completely mitigate the increase in data associated with higher quality video. Simply put, more storage and more compute is required to manage data from an increasing number of surveillance cameras capturing higher quality video.
|Security, Data Storage||Data Management, Security||February 2016|
|The Surveillance Infrastructure is Changing: How to Prepare for an Influx in Video||
Why Choosing the Right Surveillance Storage Matters.
|Data Security, Data Storage||Data Management, Security||February 2016|
|FirstNet Single Point of Contact by State||
Looking for your State’s FirstNet Contact? Click here to obtain the full list of FirstNet Contacts by State.
|FirstNet, Broadband, Data Communications||Communications||January 2016|
|Examining Electronic Monitoring Technologies||
Each year, millions of pretrial defendants and convicted offenders are supervised in their communities as they await trial or serve periods of probation or parole. Local and state agencies are increasingly using electronicmonitoring (EM) technologies to supplement supervision, tracking where offenders go and whether they are using alcohol or drugs.
Although recent studies have found that electronic monitoring is a promising tool for reducing recidivism and controlling corrections costs, questions remain about its effectiveness as an alternative to incarceration. The Pew Charitable Trusts recently interviewed five experts to get their perspectives on the uses, advantages, and disadvantages of EM technologies, as well as possible directions for future research.
|Electronic Monitoring||Data Management||January 2016|
|Kansas City, Missouri Smart Policing Initiative||
Kansas City, Missouri is a Midwestern city with a historically high rate of violent crime. Kansas City has a population of approximately 460,000 citizens who are distributed across some 319 square miles and who are served by the KCPD. Kansas City’s population is approximately 30 percent African-American and 10 percent Hispanic. Twelve percent of households are headed by single parents with children under age 18, and almost one-fifth of its citizens live below the poverty line. KCPD employs more than 1,400 sworn officers, the majority of whom are assigned to the Patrol Bureau, which operates across six patrol divisions.
The city has had a serious violent crime problem that overwhelmingly involves guns, and that is concentrated in the urban center. From 2010 through 2013, Kansas City ranked among the worst of the 50 largest cities in the United States for homicide, averaging more than 100 per year—for a rate of 22 per 100,000
A significant portion of the violent crime in Kansas City involved guns. From 2010 through 2014, 86.3 percent of all homicides and nearly half (42.1 percent) of all aggravated assaults were gunrelated. Notably, those homicides occurred in a geographically concentrated area. Of the 394 homicides in Kansas City from 2011 through 2014, 85.5 percent (n=337) had occurred in the Central, Metro and East Divisions of the city. This gun violence has persisted despite the fact that KCPD has recovered an average of 984.4 handguns per year in the Central, Metro, and East Divisions, alone.
|Security of Interactive and Automated Access Management Using Secure Shell (SSH)||
Users and hosts must be able to access other hosts in an interactive or automated fashion, often with very high privileges. This is necessary for a variety of reasons, including file transfers, disaster recovery, privileged access management, software and patch management, and dynamic cloud provisioning. Accessing other hosts is often accomplished using the Secure Shell (SSH) protocol. The SSH protocol supports several mechanisms for interactive and automated authentication. Management of this access requires proper provisioning, termination, and monitoring processes. However, the security of SSH keybased access has been largely ignored to date. This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.
|Data Security||Data Management, Security||January 2016|
|Security-focused Standardized Architecture for NIST 800-53 on the AWS Cloud||
The AWS security-focused standardized architecture solutions help streamline, automate, and implement secure baselines in AWS—from initial design to operational security readiness. They incorporate the expertise of AWS solutions architects, security and compliance personnel to help you build a secure and reliable architecture easily through automation.
This Quick Start includes AWS CloudFormation templates, which can be integrated with AWS Service Catalog, to automate building an approved reference architecture following your compliance requirements for NIST 800-53/RMF. It also includes a Security Control Responsibility Matrix (CRM), which maps security controls to architecture decisions, features, and configuration of the reference architecture.
|Data Security||Data Management||January 2016|
|CJIS Compliance on AWS||
There is a long and successful track record of AWS customers using the AWS cloud for a wide range of sensitive federal and state government workloads, including Criminal Justice Information (CJI) data. Law enforcement customers (and partners who manage CJI) are taking advantage of AWS services to dramatically improve the security and protection of CJI data, using the advanced security services and features of AWS such as activity logging (AWS CloudTrail), encryption of data in motion and at rest (Amazon S3’s Server-Side Encryption with the option to bring your own key), comprehensive key management and protection (AWS Key Management Service and AWS CloudHSM), along with integrated permission management (IAM federated identity management, multi-factor authentication).
|Data Security, CJIS||Data Management, Security||January 2016|
|Government and Public Sector Customer Engagement Optimization Solution Strategy||
Customer engagement describes the level of interaction that individual customers have, either directly or indirectly, with a specific government or public sector organization over time. The term includes all of the interactions that occur along the customer journey, whether those “touches” happen before, during or after an interaction, and whether they occur by phone, online or in person. It can also include customer interactions that may be independent of specific transactions, such as criticisms in social media or comments posted on blogs.
Customer engagement should not be confused with customer experience, since engagement encompasses an ongoing relationship with a specific government or public sector organization, as opposed to an experience at a single point in time. It is also important to note that customer engagement is proactive. Government and public sector organizations do not have to wait for a customer to act before they engage—they can reach out to customers to renew permits and licenses, deliver personalized and location-specific services, and solicit feedback. Examples of proactive customer engagement tactics include surveys not tied to specific transactions or educational outreach programs. The idea is to build an ongoing dialog with customers that engenders familiarity and some level of emotional attachment to your services.
|Customer Engagement||Data Management||December 2015|