The CommSys - ConnectCIC TM "Transaction Package Review" This event is open to CommSys partners...
-
Upload
karlie-sturgis -
Category
Documents
-
view
217 -
download
0
Transcript of The CommSys - ConnectCIC TM "Transaction Package Review" This event is open to CommSys partners...
The CommSys - ConnectCICTM "Transaction Package Review"
This event is open to CommSys partners interested in integrating their applications for entry and modification to state,
regional and national CJIS systems.
Introductions
Our goal is to define the transaction packages that make up the ConnectCICTM additional standardized transaction capability
Presenter:Bob Turner – President at CommSys, [email protected]
Coordinator:Kelli Adkins – Marketing Director at CommSys, [email protected]
Transaction Packages
This presentation serves to detail andclarify the capabilities and functions of
Additional Transaction Packagesfor purposes of information and
contractual performance
Agenda
• Discuss ConnectCICTM
– Transactions vs. Transports vs. Options
• Discuss the CJIS Systems – State and National Levels
• Review the Transaction Packages – As options to purchase for ConnectCICTM
• Closing with “Questions and Answers”
Why do this presentation?
• Most CommSys partners know ConnectCICTM from its basic configuration
• What may be less clear is what are the Transaction Packages for ConnectCICTM
Transaction Packages
• Transaction Packages allow additional functionality to software communicating with the state/ national CJIS systems
• This adds value to our partners’ customers by offering more functionality
History
When we architected ConnectCICTM, there was a we understood the requirements for the product because of the previous years of experience CommSys held in supporting the CJIS interfaces in more than 45 states.
We leveraged the speed and integrity of well written C++ code to ensure we had a high performance and reliable communication environment.
UnderstandingConnectCICTM
Understanding ConnectCICTM
CommSys primarily looks atthe CJIS interfacing for
ConnectCICTM from two aspects
CJISCriminal Justice Information System
The Two Aspects
Transports
Transactions
Transports
CommSys codes transports for every state/regional
system we connect with.
As of Today
This number is in excess
of fifty different transports
that ConnectCICTM understands.
The good thing is transports don’t change very often.
Transactions
or often referred in legacy terms to as “formats” or even “masks”
.
The transaction is what the partner invokes to take a standardized API message and
have ConnectCICTM transform it into a
state message switch transaction.
The term “formats” was the old term used to describe the layout of a teletype message. More correctly now the term that is used is transactions.
The Difference
Transports: are consistent Transactions: are changing all the time
Certainly the core Driver’s Licenses and VehicleRegistration lookups do not change a lot. However, with new transactions, and modificationsto existing, we get a lot of changes over time.
ConnectCICTM generates one or more messages to the connected CJIS systems.
Requirements
• The two main requirements were:– Transports needed to be fast and reliable– Transactions needed to be flexible and
easy to change
The requirement steered us to implement the transports in C++.
These two requirements drove most of the architecture decisions for ConnectCICTM.
Flexibility
The ability to quickly update transactions in the engine without the need to deploy a new executable to the site.
A pseudo-code or p-code engine is essentially an interpreter of a defined language.
The Java environment is a p-code engine. CommSys developed a p-code engine in ConnectCICTM for processing and formatting
CJIS transactions and messages.
Transaction StoreTransaction Store
This is part of the SQL database that is required for the software to run.
Each transaction action is modular in that a driver’s license check transaction can be properly updated in the transaction store without affecting any other transaction.
The architecture is extensible to allow new transactions and functionality in regards to message processing to be added without the ConnectCICTM engine being shutdown.
This capability is one of the greatest strengths of ConnectCICTM andthe foundation that we use to offer addition transactions
and functionality to our partners.
The transactions for thep-code engine are stored
in the ConnectCICTM
transaction store
Options vs. Transactions
There may be a bit of confusionunderstanding ConnectCICTM
“Options vs. Transaction Packages”
– Options pertain to the functionality of the ConnectCICTM Engine
• i.e. multi-server connections
– Transactions pertain to the messages that can transmit to a particular state
• Messages are segmented along functional lines
What does ConnectCICTM comes with?
• Transport– A “transport” is the code that is used to
move messages to and from an end-point. This is classically the state-side connection to a ConnectCICTM instance.
• Basic Inquiry– Basic Inquiry has been designed to support
the typical mobile data, and basic needs of both computer aided dispatch (CAD) and law enforcement records management systems (RMS).
Basic Inquiry Terminology
1. People – wanted (state and NCIC), operator license
2. Vehicles – stolen (state and NCIC), registration
3. Gun – stolen
4. Article – stolen
5. Boat – stolen and registration
The Exception: State specific – snowmobile inquiries, state minimum group(NC, SC, MS)
5 CommonTransaction Groups
Driver’s License Query
• In each group we do not provide every transaction. Instead we provide the most frequently run. For example, for persons check we provide a macro transaction Driver’s License Query transaction which checks three things:– State driver’s license information
– NCIC Wanted person by name
– If available, state wanted persons by name
CommSys provides each group one or two transactions and can be called with different parameters, such as for a vehicle check by License Plate or VIN.
Basic Inquiry (BI)
• We include BI as part of ConnectCICTM
because or our history– We started doing CJIS interfaces for
mobile and CAD systems in the early 1990s
• BI is the embodiment of the 80/20 rule
• Why is BI so important?
Identification
• A fundamental component of Law Enforcement activity is the abilityto perform identification of persons and property
• This occurs in several ways– Verification of the public’s identity when making
contact with Law Enforcement– Looking up a registered owner of a vehicle– Verifying fingerprints when arresting an individual
Why do users want other Transactions?
• Workflow!
• They don’t want to switch back and forth between applications– They want you to integrate more
functions between your application and the state CJIS system
CJIS SystemsBackground
What do the CJIS systems do?
• To understand the overall function it requires that you understand the role of the systems that make up the CJIS networks
CJISCriminal Justice Information System
History
• The CJIS networks are some of the oldest information sharing networks in the country– Dating back to the 1930s in the Northeast
• The burden of being one of the largest and prolific environments has been heavy– Some of the technology relates directly back
to the teletypes used up until the 1980s
CJIS Networks History
The need for additional transaction means having a good understanding of the operational environment of the users.
The diagram is logical in the details of describing the typical environmentmost end users see, directly or indirectly.
State Message Switch
• State managed switch– Typically by a state Criminal Justice Agency
• State Police or Patrol• Dept. of Public Safety• Dept. of Justice
– Interfaces with• DMV• Hot Files (Warrants and Wants)• Criminal History• NCIC and NLETS
NCIC
The National Crime Information Center(NCIC) is the United States' central database
for tracking crime-related information.
– Since 1967, the NCIC has been maintained by the Federal Bureau of Investigation's Criminal Justice Information Services Division
• Located in Clarksburg, WV
– Data is received from federal, state and local law enforcement agencies, as well as tribal law enforcement agencies.
What does NCIC stores:
Person records:– Persons with active arrest warrants
– Missing persons
– Persons with active protection orders
– Violent gang organizations and membership
– Terrorist organizations and membership
– Secret Service protective alerts
– Unidentified human remains information
– Convicted Sex Offenders
– Foreign Fugitives
– Immigration violators
– Parolees or people on Supervised Release
More of what NCIC stores:
Property records– Firearms records, including lost or
missing firearms – Stolen vehicles and boats – Stolen vehicle and boat parts – Stolen property – Stolen, embezzled or counterfeit securities
Nlets
Nlets provides electronic messaging to allow information exchange between state, local, and federal agencies+ support services to justice-related computer programs.
– The network is operated by Nlets - a non-profit corporation (501c3) owned and operation by the states and funded solely by fees for service.
– The federal and international components operate very similarly. Users include all U.S. states and territories, Federal agencies with a justice mission, and certain international agencies.
– Information exchange is voluntary and includes everything from motor vehicle registrations, driver's data, Interpol warrants, Canadian 'Hot File' records, and INS databases to state criminal history records.
– The primary operational site for the network is housed in Arizona, with a secure backup site located in Kentucky.
used to be known asNational Law Enforcement Telecommunications System
now they just call themselves Nlets
NCIC vs. Nlets
• NCIC is a Hot File database system– It has information relative to people, vehicles
and items involved in felony crimes
• Nlets is a network of state and national Message Switches and some database
UnderstandingTransactions
Integrated Interfaces
• This is what our partners deliver to our customers using ConnectCICTM
– This activity is primarily inquiry based
• However customers need better integration with transaction groups beyond inquiry– What are they?
Entry/Modify Transactions
• Entry – Entering the record into the file or database
• Modify – Modifying existing record in the database
• Locate – An official notification from agency to agency
• Clear – Officially clearing the record
• Cancel – Remove a record that should not have been entered
Breaking Them Down
• Entry/Modify are what you would expect– They add or update data stored in databases
(or files)
• Locate is a way to send an official notification from a “finding” agency to the “entering” agency
• Clear and Cancel remove information from the databases– However Clear retains disposition information
on what happened
How CommSys Packages Transactions
Packages vs. Expanded Query/Entry
• Traditionally when partners have needed additional transactions we have done them on a pay-per-transaction basis
– Expanded Query/Entry requests are handled on a custom quote basis– Additional Transaction Packages are priced according to the price list
• They are on the new price list which will be released at the end of the year
ConnectCICTM Transaction Packages
We provide these transaction groups under the caption ofAdditional Transaction Packages.
• Per transaction pricing was creatingnew problems– It was a challenge for both CommSys and our
Partner’s to figure out what was needed– We identified the transactions receiving the most
requests and packaged them in logical groups
• Packages are not limited to inquiry only and may also involve record entry, modification or deletion
The Six Transaction Packages
- Computerized Criminal History Inquiry (CCH)
- Basic Entry (BEP) - Wanted Missing Persons Inquiry (WMP-I) - Wanted Missing Persons Entry/Modify (WMP-E) - Administrative and Operations Support (AOS)
- Canadian Basic Inquiry via Nlets (CPIC-BI)
with multiple transactions in each group
Other Transaction
• There are other transactions that are not traditional database messages - such as:– Sending messages between agencies or – Looking up agency contact information
CJISCriminal Justice Information System
These other types of messages are a minority but they do exist and are discussed later in the document.
Alternative to Entry Packages
Considering cost effective offerings:
CommSys offers the CLIPSTM software product as a full function terminal
CLIPSTM offers more advanced integration with our partners’ Records Management Software (RMS)
Why not implement all transactions for a state?
• Could be done - but it is a lot of work and maintenance
• Or you could use CLIPSTM
– CLIPSTM can be integration in to your application using ConnectCICTM
… that is for another Webinar - ;)
Detailed TransactionsGroup Discussion
Entry/Modify Transactions
• The Basic Entry Package is a parallel to our standard Basic Inquiry Transaction Package. With Basic Inquiry there are five main groups of transactions:– persons, vehicles, guns, boats and articles
BEPBasic Entry Package
Administration and Operations
• Administrative Message (Teletype message - Agency to Agency)
• Hit Confirmation (‘Hit Request’ message or ‘Hit Response’ message)
• ORI Look-up (provides look-up ORI agency addresses)
• Hazmat ( Specialized look-up of Hazardous Materials by UN number)
• FAA Aircraft Registration Look-up (using either the aircraft registration/tail number or aircraft serial number)
AOSAdministration and Operations Support Package
Typical 5 Admin/Ops Transactions:
Computerized Criminal History
• The CCH transactions are searches for Criminal History (Rap Sheet) information maintained by the FBI or individual state. – Interstate Identification Index (Often referred to as Triple I
records)
– In-state Criminal Histories (depending on severity of the crime)
Criminal History is not an updatable file, therefore there is no entry option.
CCHComputerized Criminal History Inquiry Package
Wanted/Missing/Unidentified Person Inquiry
• Missing/Unidentified Person
• Supervised Release
• Parole/Probation
• Sex Offender
• Order of Protection
WMPIWanted/Missing/Unidentified Person Inquiry Package
Typical 5 WMPI Transactions:
Wanted/Missing/Unidentified Person Entry
• Similar to Basic Entry as a parallel to Basic Inquiry, WMPE is the parallel to WMPI.
• Provides the entry, modify, clear, cancel and support transactions that are relevant for this subset.
WMPEWanted/Missing/Unidentified Person Entry Package
Canadian Basic Inquiry Package
• Canada in similar methods to U.S. CJIS systems in maintaining databases of wants and warrants, or material items which have been stolen or gone missing. Essentially the same databases can be found in the Canadian Police Information Centre (CPIC) and the provincial systems.
CPICThe Canadian Police Information Centre Inquiries
As is the case in the U.S. in Canada the systems are splitbetween provinces and national databases.
~persons, vehicles, guns, boats and articles~
Expectations …
These are not
“flip the switch”
offerings …
Transaction Group Availability
• CommSys delivers transaction groups based on demand, and not all state systems are currently defined. CommSys will deliver an additional transaction group within sixty days after receipt of an order (ARO).
• Some states preclude some transaction types: Example – in Ohio we cannot deliver entry or modify transactions as it is not supported from integrated interface connections without special permission.
Thank You
Presenter:Bob Turner – President at CommSys, [email protected]
Coordinator:Kelli Adkins – Marketing Director at CommSys, [email protected]
Questions/Answers
www.commsys.com 800-842-5225 [email protected]
NOTE: Additional documents with information are available at the CommSys.com Support link and website