DRAFT - Information Sharing Systems & Architecture

As a P/CRCL Officer you should have an understanding of the operational environment of your fusion center. This includes being aware of the various databases that analysts at your fusion center utilize. Intelligence analysts utilize numerous databases, many of which are focused on a narrow area of interest. However, there are a few that are commonly used and it would be helpful to understand their capabilities when talking with analysts.

Most federal databases limit access to individuals who work in the law enforcement or intelligence community, and as such not all databases may be available to you. In addition, some databases require a security clearance in order to be eligible to access them.


Automated Critical Asset Management System (ACAMS)

Description:
"Provides the Automated Critical Asset Management System (ACAMS), a Web-enabled information services portal that helps state, local, tribal, and territorial governments build critical infrastructure protection programs. ACAMS provides a set of tools and resources that help law enforcement, public safety and emergency response personnel: collect and use critical infrastructure asset data, assess critical infrastructure asset vulnerabilities, develop all-hazards incident response and recovery plans, and build public-private partnerships."

Access:
Training is required for access. Web-based Training provides Federal, State, local first responders, emergency managers, and Homeland Security officials with training on the use and functionality of the ACAMS tool."

Contact: Traininghelp@hq.dhs.gov


eGuardian

Description:
The eGuardian system is FBI-owned and maintained. It provides an unclassified, secure web-based platform for reporting incidents such as “ an occurrence or reporting of a suspicious activity, threat or event relating to terrorism, cyber or criminal activity”.  In 2014 the eGuardian system became “the primary Shared Data Repository for suspicious activity reports” in support of the Nationwide SAR Initiative “Once vetted by an accepted and trained approver, this information will be shared with law enforcement at all levels in order to more effectively identify and track threats and threat patterns and take actions to mitigate such threats.”  After review certain incidents may be migrated from eGuardian to the FBI's internal Guardian system and may be assigned to the appropriate Joint Terrorism Task Force (JTTF) for possible further investigative action. Also see the updated (2014) Privacy Impact Assessment on the eGuardian system, which describes the overall operation of the system and the privacy and civil liberties protections.

Access:
Access will be provided to federal, state, local, tribal, and territorial “law enforcement partners who qualify for access to the LEO Enterprise portal and are specifically granted access to eGuardian”. Law enforcement partners include sworn enforcement officials and those working in a direct law enforcement capacity (i.e. analysts, terrorism liaison officers, etc.). If you do not have access to LEO, an application is available on its website. Access:
The eGuardian system can be accessed through Law Enforcement Online by sworn law enforcement officials and by those working in a direct law enforcement capacity (i.e. analysts, TLOs, etc.). If you do not have access to LEO, an application is available on its website.


Federal Bureau of Investigations Network (FBINet) (p.39) (114pp | 8.2mb | PDF)

Description:
FBINet serves as a global area network used for communicating secret information including investigative case file data and intelligence pertaining to national security. For example, the classified Guardian Threat Tracking System resides on FBINET. It is operated, maintained and access-controlled by the FBI.

Access:
For access to FBINet, fusion center personnel and other potentially qualified law enforcement personnel should contact their FBI representative for more information.


Homeland Secure Data Network (HSDN)

Description:
The Homeland Secure Data Network (HSDN) is a secret-level classified network through which DHS officials – as well as authorized federal, state and local partners, including fusion centers— can access tactical and strategic intelligence and other homeland security information up to the SECRET level. HSDN also serves as a consolidated backbone that brings together multiple, legacy SECRET-level classified networks across the DHS enterprise.

Access:
If you are interested in knowing whether your fusion center has access to HSDN contact your DHS Intelligence Officer for more information.


Homeland Security Information Network (HSIN)

Description:
The Homeland Security Information Network (HSIN) is a national secure, unclassified, web-based portal for information sharing and collaboration between federal, state, local, tribal, territorial, private sector, and international partners engaged in the homeland security mission.

HSIN is made up of a growing network of communities, called Communities of Interest (COI) (14pp | 410kb |PDF). COIs are organized by state organizations, federal organizations, or mission areas such as emergency management, law enforcement, critical sectors, tribal, and intelligence. Some COIs that fusion center analysts may be iterested in joining are intel(intelligence), LE (law enforcement), EM (emergency management), CS (critical sector), tribal, and state specific. HSIN provides secure, real-time collaboration tools, including a virtual meeting space, instant messaging and document sharing. HSIN allows partners to work together instantly, regardless of their location, to communicate, collaborate, and coordinate.

Access:
"Membership in HSIN is COI-based. To become a member, you will need to be nominated and vetted into the COI. E-mail the HSIN program at HSIN.Outreach@HQ.DHS.gov or contact the Mission Advocate associated with the COI of interest (14pp | 410kb |PDF)."


Law Enforcement Online (LEO)

Description:
Law Enforcement Online (LEO) is an Internet-based system that houses sensitive but unclassified information. LEO is used to support investigative operations, send notifications and alerts, and provide an avenue to remotely access other law enforcement and intelligence systems and resources. LEO provides all levels of the law enforcement, criminal justice, and public safety communities virtual private network access to its "anytime and anywhere" system for secure electronic communications, online training, and information sharing.

Access:
LEO is available to law enforcement, criminal justice, or public safety agency/department personnel whose position requires secure communications with other agencies via the Internet. As an information-sharing forum, all members are encouraged to contribute information in their area of interest or expertise. Enrollment instructions are available online (2pp | 152kb | PDF).


FEMA Lessons Learned Information Sharing (LLIS)

Description:
Lessons Learned Information Sharing (LLIS.gov) is a Department of Homeland Security/Federal Emergency Management Agency program. LLIS.gov serves as the national, online network of lessons learned, best practices, and innovative ideas for the emergency management and homeland security communities. LLIS.gov includes a library of exclusive documents and user-submitted materials related to all aspects of homeland security and emergency management. In addition, there are several excellent examples of fusion center PCRCL best practices. This information and collaboration resource helps emergency response providers and homeland security officials prevent, protect against, respond to, and recover from terrorist attacks, natural disasters, and other emergencies.

Access:
Individuals involved in emergency response and homeland security from all levels and disciplines are eligible to access LLIS.gov. Enrollment information is available on-line.


National Criminal Intelligence Resource Center (NCIRC)

Description:
"The National Criminal Intelligence Resource Center (NCIRC) is funded by the U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Assistance (BJA), BJA's overall goals are to reduce and prevent crime, violence, and drug abuse and improve the functioning of the criminal justice system. To achieve these goals, BJA programs emphasize enhanced coordination and cooperation of local, state, and federal efforts. BJA encourages the development and implementation of comprehensive strategies; provides training and technical assistance; reduces the availability of illegal weapons and develops strategies to address violence in our communities; enhances the ability of criminal justice agencies to access and use new information technologies; and encourages and supports evaluation of the effectiveness of funded programs and dissemination of program results in order to reduce and prevent crime and violence."

Fusion center personnel can access a variety of resources through NCIRC, including trainings such as: 28 CFR Part 23, The Importance of Privacy, Civil Rights, and Civil Liberties Protections in American Law Enforcement and Public Safety, and State and Local Anti-Terrorism Training. NCIRC also offers infrastructure best practices examples.

Access:
The NCIRC maintains two sites: The public site provides criminal justice professionals with easy access to a multitude of resources that are primarily concerned with local, state, tribal, and federal law enforcement intelligence operations and practices. The secured Web site provides additional training materials and information resources expressly for law enforcement professionals. For access to the secured site, log on to: Law Enforcement Online (LEO) or the Regional Information Sharing Systems (RISSNET).


National Data Exchange (N-DEx)

Description:
The Law Enforcement National Data Exchange (N-DEx) is an information-sharing tool used by criminal justice professionals. It is a repository of criminal justice records from local, state, tribal, and federal agencies across the nation, available in a secure online environment, managed by the FBI's Criminal Justice Information Services (CJIS) Division. N-DEx brings together data such as incident and case reports, arrest reports, computer-aided dispatch calls, traffic citations, narratives, photos, supplements, booking and incarceration data, and parole/probation information. Additionally, N-DEx automatically correlates and resolves data from open and closed reports to detect relationships between people, vehicles/property, locations, and/or crime characteristics. It also supports multi-jurisdictional task forces—enhancing national information sharing, links between regional and state systems, and virtual regional information sharing.

Access:
Access is handled through a state message switch at each CJIS systems agency (CSA). Enrollment instructions are available on-line.


NCTC Online (NOL-S) and NCTC Online CURRENT

Description:
These are classified databases serving the counterterrorism community through development of counter terrorism products and articles available to users across approximately 75 United States government agencies . The NOL-S repository includes all SECRET level terrorism-related products written by the National Counter Terrorism Center (NCTC), DHS, or Federal Bureau of Investigations (FBI), and issued as single-agency, joint, or fully vetted community products.

Access:
NOL-S is accessible to state and local partners through networks provided by both DHS (HSDN) Homeland Secure Data Network and the Federal Bureau of Investigations Network (FBINet).


Regional Information Sharing System (RISS)

Description:
The Regional Information Sharing Systems® (RISS) Program is a nationwide information sharing and investigative support program that serves thousands of local, state, federal, and tribal law enforcement and public safety agencies in all 50 states, the District of Columbia, U.S. territories, Australia, Canada, England, and New Zealand. RISS serves as a force multiplier, effectively and efficiently aiding agencies in tackling crime problems in their areas. RISS consists of six regional centers as well as a technology support center.

Access:
For access visit the RISS website. Users must have completed training in 28 CFR Part 23.

The six RISS Centers are:
Center Area of Responsibility (AOR) Contact

Middle Atlantic-Great Lakes Organized Crime Law Enforcement Network® (MAGLOCLEN)

Delaware, Indiana, Maryland, Michigan, New Jersey, New York, Ohio, Pennsylvania, and the District of Columbia, as well as Australia, Canada, and England

(800) 345-1322
info@magloclen.riss.net

Mid-States Organized Crime Information Center® (MOCIC)

Illinois, Iowa, Kansas, Minnesota, Missouri, Nebraska, North Dakota, South Dakota, and Wisconsin, as well as parts of Canada

(80) 846-6242
info@mocic.riss.net

New England State Police Information Network® (NESPIN)

Connecticut, Maine, Massachusetts, New Hampshire, Rhode Island, and Vermont, as well as parts of Canada

(800) 343-5682
info@nespin.riss.net

Rocky Mountain Information Network® (RMIN)

Arizona, Colorado, Idaho, Montana, Nevada, New Mexico, Utah, Wyoming, and Canada

(800) 821-0604
info@rmin.riss.net

Regional Organized Crime Information Center® (ROCIC)

Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia and West Virginia, Puerto Rico, and the U.S. Virgin Islands

(800) 238-7985
info@rocic.riss.net

Western States Information Network® (WSIN)

Alaska, California, Hawaii, Oregon, Washington, as well as Canada and Guam

(800) 952-5258
info@wsin.riss.net


Secret Internet Protocol Router Network (SIPRNet) (p.39) (114pp | 8.2mb | PDF)

Description:
The Secret Internet Protocol Router Network (114pp | 8.2mb | PDF) (SIPRNet) is a SECRET "system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information."

Access:
SIPRNet access has been limited to sites that are on the Whitelist. Fusion centers can request access to specific sites by request. Please contact your DHS Intelligence Officer for more information.


Source:This section was drawn from NCTC, DHS, FBI, CJIS, and NCRIC websites.
Last date page updated: 9/23/13 (CRCL)

Back to Home