Browse icon

Browse

Browse Categories

Emerging Product / Emerging Topic

Cover Page
Real-Time and Open Source Analysis (ROSA) Resource Guide
The Real-Time Open Source Analysis (ROSA) Resource Guide was developed by the National Network of Fusion Centers, in partnership with the Office of the Director of National Intelligence's (ODNI) Office of Partner Engagement for the Information Sharing Environment (PE-ISE), the U.S. Department of Homeland Security (DHS), ...
Cover Page
License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities
The License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities (LPR Policy Template) is a policy guidance resource designed specifically for law enforcement entities and fusion centers to assist them in their efforts to develop comprehensive privacy, civil rights, and civil ...
Cover Page
Public Safety Primer on Cloud Technology
The Public Safety Primer on Cloud Technology is a high-level primer for law enforcement and public safety communities regarding video and the cloud environment. With the quantity of video evidence now available, storage is a significant problem for record management systems and bandwidth capability. Obtaining video from a ...
Cover Page
Video Evidence: A Primer for Prosecutors
Video Evidence: A Primer for Prosecutors was developed for the purpose of educating prosecutors on the numerous sources of video evidence, the benefits of its use in court, and challenges faced by prosecutors’ offices in the handling of video evidence. A sample process flow is included as step-by-step guidance on the ...
Cover Page
Custody Release Reporting Service Specification, Version 1.0
The Custody Release Reporting Service (CRRS) receives reports regarding a release from custody (confinement).    NOTE: To fully review the purpose, scope, capability offered and real-world effect(s) this service specification intends to address, we invite your full review of the associated Service Description ...
Cover Page
Understanding Digital Footprints: Steps to Protect Personal Information
This document provides material designed to assist law enforcement personnel in protecting themselves and their families from becoming cyber targets: protecting personal information, cyber dos and don'ts, and links to further cyber training and resources.
Cover Page
Cyber Training for Law Enforcement Call to Action
The flyer is designed to help raise awareness of the need for state, local, tribal, and territorial law enforcement leaders to ensure that appropriate agency personnel receive cybercrime training.
Cover Page
Global Advisory Committee: Fall 2015 GAC Meeting Summary
This document provides an overview of the topics, resolutions, and resources (including associated links) presented and approved at the November 4, 2015, meeting of the Global Advisory Committee (GAC), held in Washington, DC, at the Office of Justice Programs offices. The GAC is supported and guided by the Bureau of Justice ...
Cover Page
Video Evidence: A Law Enforcement Guide to Resources and Best Practices
The purpose of this resource is to provide answers to straightforward common questions that law enforcement officers, or the agencies they represent, may have regarding properly securing, collecting, storing, and analyzing video by directing them to valuable tools and resources from experts in the field.  Through ...
Cover Page
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities: Guidance and Recommendations.
Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities:  Guidance and Recommendations provides law enforcement and justice agencies with guidance and recommendations on issues to consider when developing a social media policy (or updating other relevant policies), focusing on access, use, ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Terminology Matrix
The GFIPM Terminology Matrix provides a terminology and concept map between GFIPM and other prominent paradigms in the areas of identity management, privilege management, and service-oriented architecture. Its purpose is to help GFIPM stakeholders better understand the various technical terms used in GFIPM by mapping each ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Implementation Guide
The GFIPM Implementation Guide contains detailed instructions for implementers of identity providers (IDPs) and service providers (SPs), which are the two types of systems that participate in user-to-system transactions as specified in the GFIPM Web Browser User-to-System profile. The document covers all aspects of IDP and ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Web Browser User-to-System Profile
The GFIPM Web User-to-System Profile is a normative specification that defines a set of protocols and bindings for web browser-based interaction between users and resources across trust domains within a federation. It leverages parts of the SAML 2.0 specification, specifically Web Single Sign-On (SSO) and Single Log-Out ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Cryptographic Trust Model
The GFIPM Cryptographic Trust Model defines a normative schema for a GFIPM Cryptographic Trust Fabric, which is document shared among all members of a GFIPM federation. A GFIPM Cryptographic Trust Fabric document contains public key material and system entity metadata for each trusted endpoint in the federation. The spec ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Operational Policies and Procedures Guidelines
The GFIPM Operational Policies and Procedures Guideline document describes the operational policies and procedures that govern the basic operation of a federation for trusted information sharing, including federation membership, change management for federation standards, help desk policies, etc. It also contains some ...
Cover Page
Federated Identity and Privilege Management (GFIPM): Governance Guidelines
The GFIPM Governance Guideline document defines the governance structure for a GFIPM federation, including the parties that play a role in the governance structure (e.g. Board of Directors, Federation Management, Identity Providers, Service Providers, Trusted Identity Brokers, etc.) and the decisions to be made by each ...
Cover Page
Global Federated Identity and Privilege Management (GFIPM) 2007 Users Conference Summary Briefing
This PowerPoint presentation was submitted by the Georgia Tech Research Institute (GTRI) to provide an introduction and status of the GFIPM project.  These slides were delivered during the Chicago Users' Conference on August 21, 2007.
Cover Page
Global Federated Identity and Privilege Management (GFIPM) Security Interoperability Demonstration
It is clear that the entire justice and law enforcement community stands to benefit from a solution that allows user management processes (vetting, permissioning, and credentialing) to be efficiently and effectively leveraged and reused across trust domains, thereby facilitating interoperability between SBU information ...
Cover Page
Global Federated Identity and Privilege Management (GFIPM): Executive Summary
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. This pamphlet offers a brief summary on how the GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice ...
Web Address Icon
SEARCH Podcast: The Global Federated Identity & Privilege Management Initiative
Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. The GFIPM initiative provides the justice community with a security and information sharing architecture that is based on an electronic justice credential. This standards-based justice credential ...
Cover Page
GFIPM Metadata Specification 2.0 Overview and Usage
The GFIPM Metadata 2.0 specification defines common syntax and semantics for metadata describing users, entities (trusted software service endpoints), resources (sensitive data objects, databases, documents, etc.), actions (attempts by users or entities to access resources), and the data-sharing environment in which actions ...
Cover Page
Implementing Privacy Policy in Justice Information Sharing: A Technical Framework
This document is intended to provide guidelines for supporting the electronic expression of privacy policy and how to convert privacy policy so that it is understandable to computers and software. This report is intended as a resource for a technical audience, including National Information Exchange Model (NIEM) and Global ...
Cover Page
Global Justice Information Sharing Initiative: Exploring Service-Oriented Architecture Services for Justice Information Sharing
This is a pamphlet that offers the reader the opportunity to (1) learn about the U.S. Department of Justice’s Global Justice Information Sharing Initiative (Global) and its pursuit of a Justice Reference Architecture, (2) explore the concept of SOA and why it is important to the future of justice information sharing, and ...
Cover Page
Global Reference Architecture (GRA) Information Sharing Enterprise Statement of Participation, Version 1.1
The purpose of this document is to provide a reference model framework of expectations and obligations for those entities participating in any state, local, regional, or tribal information sharing enterprise. An information sharing enterprise is a consortium of information service providers and service consumers created ...
Cover Page
Global Reference Architecture (GRA) Technical Note RESTful Web Services
This Technical Note does not reflect a normative policy position from the Global Justice Information Sharing Initiative (Global) community of stakeholders. Rather, it is intended to inform participants and practitioners on architectural compatibility issues known to exist between the Global Reference Architecture and ...
Cover Page
Fusion Center Privacy Policy Development: Privacy, Civil Rights, and Civil Liberties Policy Template
The FC Privacy Template was developed by DOJ in collaboration with DHS in the joint DHS/DOJ Fusion Process Technical Assistance Program. This template was designed specifically to assist fusion center personnel in developing a privacy policy related to the information, intelligence, and suspicious activity report (SAR) ...
Cover Page
Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Justice Entities
Practitioners are provided a framework with which to examine the privacy implications of their information systems and information sharing collaborations so they can design and implement privacy policies to address vulnerabilities identified through the assessment process. Privacy policies emerge as a result of the analysis ...
Cover Page
7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy
Designed for both justice executives and agency personnel, this document raises awareness and educates readers on the seven basic steps involved in the preparation for development of a privacy, civil rights, and civil liberties policy (as recommended in DOJ's Privacy, Civil Rights, and Civil Liberties Policy Development ...
Cover Page
The Global Reference Architecture (GRA) Service Specification Guideline V 1.2.0
This document is intended to provide a formal, standardized means of creating and understanding service specifications and service specification packages.  This document was revised to Version 1.2 with the following minor changes:  Included the use of underscores between words in all folder names. 
Cover Page
Global Reference Architecture (GRA) Guidelines for Identifying and Designing Services Version 1.1
The intent of this document is to provide guidelines to justice organizations that have interest in following or applying the Global Reference Architecture (GRA) in development of a Service-Oriented Architecture (SOA). This document concentrates on an approach to identifying and designing services that will enable effective ...
Cover Page
Global Reference Architecture (GRA) Framework, Version 1.9.1
The Global Reference Architecture (GRA) Framework—is a conceptual framework for Service Oriented Architecture (SOA) that is based on an industry standard, the OASIS SOA Reference Model, which was developed by a committee of industry and government SOA experts, including some of the Global Infrastructure/Standards Working ...
Cover Page
Global Privacy Resources Booklet
Thanks to the great work by the U.S. Department of Justice's (DOJ) Global, Global partners, and through DOJ collaborations with other federal agencies, there are a variety of privacy awareness, policy development, and implementation products available to the justice community today. To help these agencies know which privacy ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Template for State, Local, and Tribal Justice Entities: SLT Policy Development Template
Included in the Privacy Guide is the SLT Policy Development Template, which was developed to assist SLT agencies in drafting a privacy policy. The provisions suggested are intended to be incorporated into the agency's general operational policies and day-to-day operations. Each section represents a fundamental component of ...
Cover Page
Privacy, Civil Rights, and Civil Liberties Policy Development Guide for State, Local, and Tribal Justice Entities: Privacy Guide
This guide is a practical, hands-on tool for SLT justice practitioners charged with drafting the privacy policy, providing sensible guidance for articulating privacy obligations in a manner that protects the justice agency, the individual, and the public. This guide provides a well-rounded approach to the planning, ...
Cover Page
Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development
An awareness resource for justice executives, as well as an informational tool to use for training. The easy-to-read flyer is designed to engender awareness about the topic, make the case for privacy policy development, and underscore the importance of promoting privacy protections within justice agencies. Included is ...