You are on page 1of 6

w--

C'I
...
o
«U
III
C
:c
-
.
continued from 'IT on page 13
Implementing a successful IT Project effectively also
Law enforcement information systems are a critical compo- depends on the chief executive ensuring that key elements are
nent to effective policing because information gives law enforce- included in the project management plan. First, the organiza-
ment the ability to solve and possibly prevent crime. The infor- tion must have a strategic business plan that articulates the
mation system should enhance and improve police and public agency's mission, goals and objectives. It is imperative that the
safety but it needs to be shared at local, state and federal levels chief executive and management recognize the mission-critical
to be beneficial. role of IT in the criminal justice system, and act accordingly to:

The complex and wide-ranging responsibilities of a law


· Implement the budgetary practices using lifecycle costing
and the SDLC for continual planning, maintenance and
enforcement agency require a varied supply of resources and
information systems. The information systems available provide
a multitude of services and, working together, unlimited
· support of information systems.
Develop a strategic IT vision plan. A strategic vision plan
explains how technology will assist the agency in meeting
amounts of information and tools, which fortify law enforce- its core business mission.
ment Popular applications deployed on a law enforcement net- · Take action to implement a plan that strives to meet the
workare:
·· Computer Aided Dispatch (CAD)
goals of the strategic vision plan through a series of IT
Projects that build the IT capabilities of the agency.

·· Records Management System (RMS)


MobileComputing Second, the Project Manager takes responsibility for execut-

· Automated Field Reporting


Jail Management Systems (JMS)
(AFR) ing the plan and assembling a team to manage the project
through completion and evaluation. The Project Manager needs

·
· Geographic Information Systems (GIS)
Computer Mapping and Crime Analysis
to ensure the following:
· Identify and define the problem
· Conduct a risk assessment
·
·

·
Automatic Vehicle Location (AVL)
Automated Fingerprint Identification System (AFIS)
Digital Photography
·· Set realistic goal, objectives and timelines
Develop a thorough project plan
· Criminal Intelligence (CI) · Negotiate contracts
· Develop structured implementation
·
Implementing the above-mentioned applications requires
law enforce~ent to have a reliable, secure and manageable data
network. Law enforcement networks involve multiple technolo-
· Plan training
Establish benchmarks and performance for assessing and
evaluating the project's success
gies and should be designed like any other IT Project.
A Business Process Reengineering ("BPR") plan is the
Planning and deploying IT in a law enforcement agency is process of examining a business' current methods of operation
not easy, but the benefits are substantial and well worth the and evaluating those methods for streamlining the work-
effort. The Standish Group conducted a study (1994) of over process. Major IT Projects require substantial dollar investments
8,000 public and private IT Projects with the following results: and usually support a business change that enhances the current
·· 52% of all IT Projects cost 189% of original estimates
Large organizations net only 42% of the original features
business process. In many cases, the economic benefits, meas-
ured as return on the capital being invested, can be realized only
and functions in the end product through some combination of change or transformation within
· 31% of IT Projects are cancelled before completion the business operation. Ultimately, the success of the BPR
· Only 26% of large scale projects are completed on time and process is measured by the product or service produced and the
within budget resources such as, fiscal, personnel or the time utilized to pro-
duce the end product.
Technology planning, acquisition and implementation are
not a one-time activity. The process is cyclical in nature follow- Project Managers must consider not only the infrastructure
ing the Systems Development Life Cycle ("SDLC"). SDLC is a of their internal or hard-wired networks but also their external
process with several phases including planning, procurement, networks or wireless networks. Simply stated, a network is basi-
...
DI
o
implementation, and management; however, the successful cally, two or more computers connected together enabling them
iii implementation of a system does not signal the end of a project. to exchange information and share resources such as, a printer
"'
r:: Systems implementation signals the beginning of a new phase of or a file. A computer network that spans a relatively small area is
:c
.... evaluating a recently adopted system and, planning for system called a LANor Local Area Network and is usually confined to a
w
maintenance, upgrade, enhancements and replacement. Law single building or group of buildings. Several LANs connected by
~
U enforcement executives must be cognizant of the fact that the telephone lines, frame relays, the Internet, fiber optics or radio
oVI
VI SDLC requires funding in a succession of fiscal budget years. waves is called a Wide Area Network (WAN),which is not con-
«w fined to a small geographical area.
:I:
I- continued on page 15
continued from 'IT' on page 14 In order to utilize powerful applications such as computer-
Most LANS connect servers, workstations, personal comput- aided dispatch, records management, automated field reporting
ers, and printers (also called nodes). Each workstation or per- and computer mapping, an agency must have a computer net-
sonal computer has a Central Processing Unit ("CPU") that per- work capable of supporting the applications. The primary ele-
mits the computer to execute applications, access databases, and ments when planning a data network are capacity, scalability,
devices anywhere on the LAN.Ethernet, the most common, reliability, security and manageability. Capacity requires a deter-
Token Ring, Peer to Peer, and AppleTalk are a few of the many mination of the resources required by network users, not only
different types of networks and can be differentiated using the the agency's needs for the present, but also the future. Network
following characteristics: designs should be scaleable either vertically, by increasing sys-
tem components such as CPU speed or added memory; or, hori-
. Topology: The geometric arrangement of devices on the zontally by adding servers to the network. Security should be
network, for example, devices can be arranged in a ring or a considered in every part of the network design while managea-
straight line. bility and reliability can be directly determined by your needs
and risk assessments.
. Protocols: The rules and encoding specifications for sending
data that determines whether the network uses a Peer-to- The primary features of a law enforcement network are
Peer or Client Server Architecture. Common Protocols Computer Aided Dispatch ("CAD")and Records Management
include: Systems ("RMS"). CADsystems are an integral tool in modern
· TCP/IP policing and the entry point of data in a law enforcement agency.
· NETBUIE Call-receivers and dispatchers enter requests for service from the

··
· TokenRing
AppleTalk
public through the 911 system; seven-digit telephone lines; and
officer initiated calls. CADallows an agency to automate its call

·
IPx/SPX
SNA
receiving and dispatching functions, while managing the assign-
ment of units to incidents and requests for service.

. Media: Devices can be connected by unshielded twisted pair Enhancements to CADinclude geo-verifying the callioca-
(UTP) coaxial cables or fiber optics. Some networks do without tion, whether it is a residential address, business or common-
connecting media altogether, communicating instead with radio place. The right location is critical to officers in the field to
waves. ensure a timely response. CADsystems can also prioritize calls
for service and make recommendations for unit and resource
XML or, ExtensibleMark-upLanguage,is a softwarestan- dispatching based on post, sectors, beats, nearest or available
dard that structures data such as a department's Records units. A CADsystem should also be integrated with RMS to pro-
Management System ("RMS"), which creates an opportunity to vide incident location history, people and address advisories,
share data among different systems. XML is a web-based tech- warrants, firearms, restraining orders and hazards to the user in
< nology that is available to all law enforcement agencies and can a useful display.
share records management information without having to
rebuild systems. Essentially, XMLsimply utilizes standard-based RMS collects and stores information generated by calls for
data labels that create a bridge between different information service, police dispatches, investigations and officer contacts.
systems. Information collected can be analyzed, tracked and assist in
managing criminal and non-criminal events. RMS automates the
Today, the most common networks are Ethernet, using the daily business practices of entering, storing, retrieving, retain-
TCP/IP protocol suite, and connected with unshielded twisted ing, archiving, viewing and exchanging records, documents,
pair (UTP) cable. Network infrastructure also includes hubs, data, files, intelligence related to persons such as, vehicles,
bridges, switches, routers, modems, and servers. Servers handle arrests, warrants, citations, pawn tickets, civil process paper, C1
..
network tasks such as authenticating users, storing files, manag- service property and evidence. o
iii
ing printers, and running applications such as database and I'll
C
email programs. Servers and client computer systems can run CADand RMS must be integrated to avoid repetitious data
entry. The purpose of a sophisticated CADand RMS system is to
-
:c
on many different operating platforms such as Windows NT4,
Windows 2000, Linux, UNIX, MACOIS, and Novell Netware, and improve the accuracy of information and the speed it can be
soon-to-be released Windows net. Security is generally central- accessed. A properly implemented CADand RMS system can sig-
ized and allows users to have one user account for logging on to nificantly streamline data processing and workflow while
any computer in the network. The most common types of improving the overall quality of information retrieved.
servers in a law enforcement environment include application,
fax, FTP, Mail, proxy, Telnet and web servers. Police organizations can enhance an officer's ability to

CD
u...
continued on page 30

I
continued from 'Up On IT' on page 15
pieces of information about a location or, view selected pieces of
access, exchange, create, and receive information through information in layers, which increases the complexity of crime
mobile computing or handheld devices, such as a Personal analysis. The computer generated mapping and GIS (with data
Digital Assistant ("PDA"). Wireless devices have revolutionized imported from RMS) assist in visualizing crime occurrences and
the way public safety personnel perform every day tasks, such as correlating factors such as school locations, known criminals,
enabling police officers to "walk-the-beat" while staying in con- and other related events. Extensive crime analysis allows critical
tact with headquarters. Information such as intelligence, patrol resources to be used effectively to reduce crime, solve communi-
alerts, streaming video, pre-plans, mapping, hazardous materials ty problems and enhance the quality of life for citizens; and deci-
information and department policies and procedures are impera- pher criminal activity.
tive to law enforcement. An officer's access to query local, state
and national databases; send and receive email; prepare police In connection with the location identification of a cell-
reports; enter field interview information; access policy and pro- phone user, there are two phases that need to be implemented.
cedures and look up legal statutes is immeasurable. Automatic Phase I Wireless E911, requires integrating the call receiving
Field Reporting ("AFR")produces immediate incident reports procedure in CADwith GIS and computer mapping; and, it also
that can be sent for supervisor approval and directly submitted requires that the service provider (i.e., AT&T)reports the call-
to the RMS, which increases officer productivity. The software back number and originating cell site to the 911 operator.
for AFR offers data integrity checks, drop-down menus, pre-filled Implementation of phase II wireless E911 is based on FCC
fields, pre-population of multiple forms and automatic error requirements that an address translator feature interprets the
detection. Today, an officer's patrol car has affectively become a x:i coordinate location into a block range and address, and pos-
mobile office through the implementation and assistance of a sibly a common name based on the distance from the nearest
mobile computer and/or PDA. tower(s). Phase II will revert to Phase I if it is unavailable.

Project Managers must decide what type of wireless connec- The terror attacks of September 11,2001 highlighted the
tivity they will utilize to implement a wireless network and the necessity of extensive Criminal Intelligence ("CI") systems.
services geographically available. Wireless technology generally Criminal Intelligence modules are used for the entry, retention,
available include: analysis, and sharing of criminal intelligence data not only to
· CDPD -Cellular DigitalPacket Data assist with combating terror but narcotics or other criminal
· CDMA-Code Division Multiple Access activity. Users in different jurisdictions can enter a suspect
. GPRS -General Packet Radio Service
·· RF-RadioFrequency
Wireless WAN,WiFi, 802.11
and/or case-data based on a wide choice of criteria, which can be
queried for information on cases and events. XML is ideal for
intelligence modules; however coordination between federal,
state, county and local agencies is vital for this to be effective.
-0I It is necessary to confirm with the service provider that
service will be continued in the future; some service providers The physical and logical topology in a data network should
haveannounced their intention to cease CDPD serviceover the be considered. The following questions can assist in the design
next several years. phase:
· Who will use the network?
A Jail Management System ("JMS") is available for larger · Is the network part of a larger network, (i.e. municipal
agencies and correctional facilities. JMS is designed to manage government) ?
these facilities by tracking inmates, inmate processing, classifica- · Will cns information (Le., NCIC 2000) be available on the
tion, cell management, medical history, visitor logs, fingerprints, network?
and mugshots. The Automated Fingerprint Identification System · Will the Internet be deployed on the network?
(AFIS) and digital photography software facilitates digital mug · Will the agency host a web site or email on the network?
shots and fingerprints for searches, verifications and identifica- · How will the agency share appropriate criminal justice data
tion by querying in-house, local, state and federal databases. with local,state and criminal justice agencies?

Working together, Geographic Information Systems It is important to remember that even though computers
...
CI
o
("GIS"), computer mapping software, and automated vehicle may be physically separate from other non-law enforcement
n:i location (AVL)provides law enforcement with instantaneous agencies, the network can still be vulnerable if devices are con-
CO
~ information to respond, prevent, and investigate crime. nected or, a service such as the Internet is shared.
:c
.... Dispatchers are able to quickly determine the precise location
w
and the necessary unit that is closest in proximity to the loca- Security should be of paramount importance in the design,
~
U tion. In the form of layers connected by a common framework, deployment, and implementation of any law enforcement infor-
o
V1
V1 GIS stores information about locations, buildings, common mation system network. The information system and agency's
<:t:
w place names, zip codes, phone numbers, even latitude and longi-
:I:
I- tude. The layering of information allows users to view single continued on page 31
-:
continued from 'Up On IT' on page 30 2) Usersshould never be permitted to installunauthorized
software or devices;
~ operations are at risk if connected to other networks or if a
3) Modems should never be connected to network devices
breach occurs. Unlawful access to criminal justice information
without additional authentication procedures beyond
on the law enforcement network can jeopardize criminal prose-
username, login and password;
cution, investigations and everyday operations of the agency.
4) Critical network components and data should be backed
Strict security policies outlining physical connections to the net-
up regularly and back up media should be stored
work, user guidelines, email policy, Internet usage, network
securely off site;
auditing, backup and disaster recover planning are indispensable
5) Ensure all users have the minimum necessary access to
steps to sustain security.
computers, applications and data to perform their job
related functions;
Antivirus software protects the network and its components
6) Never install unnecessary services on computers and
from viruses, worms, and Trojan horses. The first PC virus was
recorded in 1987; today the number of known viruses is in the
servers;
7) Enforce password complexity and history policies;
tens of thousands. The Microsoft Encyclopedia of Networking
8) Protect the network from external threats as well as
(2000)by Microsoft Press offers the following definitions:
internal threats; and
· Virus: Any piece of code that is deliberately written to cause
9) Always keep operating systems up-to-date by deploying
damage or annoyance to computer users on a network. Tens
of thousands of different "strains" of viruses have been the latest patches, hot-fixes and updates.
detected over the years. The effects of these viruses range
Securing a computer network from every conceivable threat
from harmless messages announcing the presence of an
is impossible; however, computer networks can be successfully
"infection" to malicious deletion of crucial system and data
files. protected from an attack or, at the least, minimally damaged.
Information Technology has made a substantial impact on public
safety agencies by automating processes, increasing productivity,
Types of malicious programs that are not strictly viruses do
streamlining workflow, decreasing emergency response times
not reproduce but can have similar effects, which include:
and increasing community safety. Law enforcement executives
· Trojan horses: Programs that masquerade as other
require diligence in identifying technology needs for their
programs and are typically used to steal credentials or other
agency while supporting the department's efforts fiscally and as
information from a user. I well as through policies. A project should be viewed as a problem
· Worms: Programs that invade meil1.9.ry to destroy files but
scheduled for solution; and solutions are determined by collabo-
are not disk resident. '\
rative efforts of executives, managers, and users. Executives need
· Logicbombs: Programs that are triggered when a certain
to be vigilant to ensure that IT projects are geared to meeting
event or sequence of events occurs.
the agency's mission and strategic goals by clearly defining the
project; getting the right personnel involved; setting realistic,
Malicious programs combining the properties of a virus
obtainable, and measurable goals and objectives; developing a
with one or more of these programs are not easy to categorize.
thorough project plan; accurately assessing risk, structuring
Vigilance in the protection of networks, in conjunction with
implementation; providing adequate training and establishing
anti-virus protection, should be considered mandatory for any
benchmarks and performance metric for assessing and evaluat-
network and continually updated.
ing an IT project's success. Law enforcement agencies should
provide a functional spec for vendors and be prepared to look
The term "firewall" is used when discussing computer net-
outside of their agency for professionals in particular fields such
work security but few people understand what a firewall is or
as, Project Management, Information, Law Enforcement
how it protects you. A firewall is a security perimeter that pro-
tects the network and its resources from malicious attacks to Operations, and Certified Network Engineers. The challenges
and obstacles that present themselves prior to, and during, an IT
, steal, damage, destroy or corrupt the network. Firewalls include
Project will be ubiquitous, but the satisfaction derived from suc-
hardware or software or, a combination of the two, which is the
ideal situation. cess in overcoming them will be well worth the effort. Law
enforcement executives, although not directly, have a responsi-
bility to ensure that work on the operational level of an agency is
Conduct a thorough risk assessment before you create any
performed, safely, efficiently and effectively. A well designed and
security policy. A risk assessment helps balance the risks to your
implemented law enforcement information system will provide
network versus the cost of protecting your information systems.
the front line officers and investigators with the information
A few fundamental security procedures that should be followed
necessary to combat crime, solve problems, and achieve the mis-
with any law enforcement network include:
sion of every law enforcement officer to "protect and serve." (I)
1) Never connect to an external network directly or
indirectly without a security system in place such as, a
firewall; continued on page 321

I
continued from 'IT' on page 311 Icontinued from 'Broward' on page 27]

About the author: Sergeant Steven Santucci has servedas a trade. BSO'sDrug DiversionUnit hasbeen alerted to over 15,000
police officer for the Ridgewood, New Jersey Police Department individuals in Broward County over the last ten years that are
since 1990. He currently serves as the head of the Information associated with the abuse of pharmaceutical drug diversion.
Technologies Division. Steve is a graduate of Northwestern Many of the individuals surface from one investigation to the
University's School of Police Staff and Command, holds a certifi- next.
cate in Advanced Networking from Rutgers University and is a
certified computer systems engineer. Based on this constant activity, law enforcement officials
believe that in excess of two million dose units of pharmaceuti-
Steve is responsible for the public safety computer informa- cal controlled substances a year are hitting the streets of
tion systems for the Village of Ridgewood. The Ridgewood public Broward County for non-medical or illicit purposes. That
safety network serves not only law enforcement, but fire, EMS amounts to a street price of over ten million dollars a year. It is
and a multi-jurisdictional communications center as well. He this pattern of abuse that urges law enforcement and regulatory
supports over 100 users and 70 plus workstations, servers, and
mobile computers, all utilizing CAD,RMS, Field reporting and
Computer Mapping.
to the long neglected area of prescription drug abuse. .
agencies to alert our legislators that attention must now be paid

For more information about the Broward County Sheriff's Office


Drug Diversion Unit e-mail Det. Lisa McElhaney at
lisa_mcelhaney@sheriff.org.

InternationalMissionInformationSource
Iraq Mission

O n behalf of the United States Department of States,


Bureau of International Narcotics and Law
· We are seeking specialized
generalist position.
skills - this is not a

Enforcement Affairs, DynCorp Aerospace Operations (UK)


Ltd. (DAOL),a CSC Company, is seeking individuals with Additional details will be discussed.
appropriate experience and expertise to participate in an
international effort to re-establish police, justice and prison
How to Apply
functions in post-conflict Iraq. Interested applicants must
If you meet all the requirements for this position and
be active duty, retired or recently separated sworn police are interested in this challenging assignment, please send
officers, correctional officers or experienced judicial experts. us a resume using our ResumeMaker. Include specialtrain-
US citizenship is required. If interested, please call toll-free ing, assignments and certifications in your resume.
(866) 258-8770or email cODs.recruitim!@dvncoro.com or
visit www.]!olicemission.com. To apply, fax your resume to:
Iraq Recruiting

·· us Citizen
Qualifications

Applicant must have a total of ten (10) years of sworn


(817) 737.1608

Or mail your resume to:


civilian domestic law enforcement experience. International Police Program Recruiting - 7th Floor
· Actively serving sworn law enforcement officer, or 6500 West Freeway, Suite 600
en
... recently separated sworn law enforcement official Fort Worth, Texas 76116
o
to
III
(within 5 years but 3 years is preferred).
C · Ability to communicate in English. Once your resume is received, we will contact you with
:c further details.
\f-
· Valid US driver's license and ability to operate a
LU

~
U
o
V)
V)
·· standard transmissionvehicle.
Unblemishedbackground.
Excellenthealth.
For mission recruiting and status, call our recruiting
line: 1 (866) 258.8770.
«LI.I · Valid U.S. passport will be required.
:I:
I-

You might also like