620 likes | 734 Views
The CommSys - ConnectCIC TM "Transaction Package Review". This event is open to CommSys partners interested in integrating their applications for entry and modification to state, regional and national CJIS systems. Introductions.
E N D
The CommSys - ConnectCICTM "Transaction Package Review" This event is open to CommSys partners interested in integrating their applications for entry and modification to state, regional and national CJIS systems.
Introductions Our goal is to define the transaction packages that make up the ConnectCICTM additional standardized transaction capability Presenter:Bob Turner – President at CommSys, Inc. turner@commsys.com 937-425-0402 Coordinator:Kelli Adkins – Marketing Director at CommSys, Inc. marketing@commsys.com 937-425-0411
Transaction Packages This presentation serves to detail andclarify the capabilities and functions ofAdditional Transaction Packagesfor purposes of information andcontractual performance
Agenda • Discuss ConnectCICTM • Transactions vs. Transports vs. Options • Discuss the CJIS Systems • State and National Levels • Review the Transaction Packages • As options to purchase for ConnectCICTM • Closing with “Questions and Answers”
Why do this presentation? • Most CommSys partners know ConnectCICTM from its basic configuration • What may be less clear is what are the Transaction Packages for ConnectCICTM
Transaction Packages • Transaction Packages allow additional functionality to software communicating with the state/ national CJIS systems • This adds value to our partners’ customers by offering more functionality
History When we architected ConnectCICTM, there was a we understood the requirements for the product because of the previous years of experience CommSys held in supporting the CJIS interfaces in more than 45 states. We leveraged the speed and integrity of well written C++ code to ensure we had a high performance and reliable communication environment.
Understanding ConnectCICTM CommSys primarily looks atthe CJIS interfacing for ConnectCICTM from two aspects CJIS Criminal Justice Information System
The Two Aspects Transports Transactions
Transports CommSys codes transports for every state/regional system we connect with.
As of Today This number is in excess of fifty different transports that ConnectCICTM understands. The good thing is transports don’t change very often.
Transactions or often referred in legacy terms to as “formats” or even “masks” . The transaction is what the partner invokes to take a standardized API message and have ConnectCICTM transform it into a state message switch transaction. The term “formats” was the old term used to describe the layout of a teletype message. More correctly now the term that is used is transactions.
The Difference Transports:are consistent Transactions:are changing all the time Certainly the core Driver’s Licenses and Vehicle Registration lookups do not change a lot. However, with new transactions, and modifications to existing, we get a lot of changes over time. ConnectCICTM generates one or more messages to the connected CJIS systems.
Requirements • The two main requirements were: • Transports needed to be fast and reliable • Transactions needed to be flexible and easy to change These two requirements drove most of the architecture decisions for ConnectCICTM. The requirement steered us to implement the transports in C++.
Flexibility The ability to quickly update transactions in the engine without the need to deploy a new executable to the site. A pseudo-code or p-code engine is essentially an interpreter of a defined language. The Java environment is a p-code engine. CommSys developed a p-code engine in ConnectCICTM for processing and formattingCJIS transactions and messages.
Transaction Store Transaction Store The transactions for thep-code engine are stored in the ConnectCICTMtransaction store This is part of the SQL database that is required for the software to run. Each transaction action is modular in that a driver’s license check transaction can be properly updated in the transaction store without affecting any other transaction. The architecture is extensible to allow new transactions and functionality in regards to message processing to be added without the ConnectCICTM engine being shutdown. This capability is one of the greatest strengths of ConnectCICTM andthe foundation that we use to offer addition transactionsand functionality to our partners.
Options vs. Transactions There may be a bit of confusionunderstanding ConnectCICTM“Options vs. Transaction Packages” • Options pertain to the functionality of the ConnectCICTM Engine • i.e. multi-server connections • Transactions pertain to the messages that can transmit to a particular state • Messages are segmented along functional lines
What doesConnectCICTMcomes with? • Transport • A “transport” is the code that is used to move messages to and from an end-point. This is classically the state-side connection to a ConnectCICTM instance. • Basic Inquiry • Basic Inquiry has been designed to support the typical mobile data, and basic needs of both computer aided dispatch (CAD) and law enforcement records management systems (RMS).
People – wanted (state and NCIC), operator license Vehicles – stolen (state and NCIC), registration Gun – stolen Article – stolen Boat – stolen and registration Basic Inquiry Terminology 5 Common Transaction Groups • The Exception: State specific – snowmobile inquiries, state minimum group(NC, SC, MS)
Driver’s License Query • In each group we do not provide every transaction. Instead we provide the most frequently run. For example, for persons check we provide a macro transaction Driver’s License Query transaction which checks three things: • State driver’s license information • NCIC Wanted person by name • If available, state wanted persons by name • CommSys provides each group one or two transactions and can be called with different parameters, such as for a vehicle check by License Plate or VIN.
Basic Inquiry (BI) • We include BI as part of ConnectCICTM because or our history • We started doing CJIS interfaces for mobile and CAD systems in the early 1990s • BI is the embodiment of the 80/20 rule • Why is BI so important?
Identification • A fundamental component of Law Enforcement activity is the abilityto perform identification of persons and property • This occurs in several ways • Verification of the public’s identity when making contact with Law Enforcement • Looking up a registered owner of a vehicle • Verifying fingerprints when arresting an individual
Why do users want other Transactions? • Workflow! • They don’t want to switch back and forth between applications • They want you to integrate more functions between your application and the state CJIS system
What do the CJIS systems do? CJIS • To understand the overall function it requires that you understand the role of the systems that make up the CJIS networks Criminal Justice Information System
History • The CJIS networks are some of the oldest information sharing networks in the country • Dating back to the 1930s in the Northeast • The burden of being one of the largest and prolific environments has been heavy • Some of the technology relates directly back to the teletypes used up until the 1980s
CJIS Networks History The need for additional transaction means having a good understanding of the operational environment of the users. The diagram is logical in the details of describing the typical environment most end users see, directly or indirectly.
State Message Switch • State managed switch • Typically by a state Criminal Justice Agency • State Police or Patrol • Dept. of Public Safety • Dept. of Justice • Interfaces with • DMV • Hot Files (Warrants and Wants) • Criminal History • NCIC and NLETS
NCIC The National Crime Information Center(NCIC) is the United States' central databasefor tracking crime-related information. • Since 1967, the NCIC has been maintained by the Federal Bureau of Investigation's Criminal Justice Information Services Division • Located in Clarksburg, WV • Data is received from federal, state and local law enforcement agencies, as well as tribal law enforcement agencies.
What does NCIC stores: Person records: • Persons with active arrest warrants • Missing persons • Persons with active protection orders • Violent gang organizations and membership • Terrorist organizations and membership • Secret Service protective alerts • Unidentified human remains information • Convicted Sex Offenders • Foreign Fugitives • Immigration violators • Parolees or people on Supervised Release
More of what NCIC stores: Property records • Firearms records, including lost or missing firearms • Stolen vehicles and boats • Stolen vehicle and boat parts • Stolen property • Stolen, embezzled or counterfeit securities
Nlets Nlets provides electronic messaging to allow information exchange between state, local, and federal agencies+ support services to justice-related computer programs. • The network is operated by Nlets - a non-profit corporation (501c3) owned and operation by the states and funded solely by fees for service. • The federal and international components operate very similarly. Users include all U.S. states and territories, Federal agencies with a justice mission, and certain international agencies. • Information exchange is voluntary and includes everything from motor vehicle registrations, driver's data, Interpol warrants, Canadian 'Hot File' records, and INS databases to state criminal history records. • The primary operational site for the network is housed in Arizona, with a secure backup site located in Kentucky. used to be known asNational Law Enforcement Telecommunications Systemnow they just call themselves Nlets
NCIC vs. Nlets • NCIC is a Hot File database system • It has information relative to people, vehicles and items involved in felony crimes • Nlets is a network of state and national Message Switches and some database
Integrated Interfaces • This is what our partners deliver to our customers using ConnectCICTM • This activity is primarily inquiry based • However customers need better integration with transaction groups beyond inquiry • What are they?
Entry/Modify Transactions • Entry –Entering the record into the file or database • Modify –Modifying existing record in the database • Locate –An official notification from agency to agency • Clear –Officially clearing the record • Cancel –Remove a record that should not have been entered
Breaking Them Down • Entry/Modify are what you would expect • They add or update data stored in databases (or files) • Locate is a way to send an official notification from a “finding” agency to the “entering” agency • Clear and Cancel remove information from the databases • However Clear retains disposition information on what happened
Packages vs. Expanded Query/Entry • Traditionally when partners have needed additional transactions we have done them on a pay-per-transaction basis • Expanded Query/Entry requests are handled on a custom quote basis • Additional Transaction Packages are priced according to the price list • They are on the new price list which will be released at the end of the year
ConnectCICTMTransaction Packages • Per transaction pricing was creatingnew problems • It was a challenge for both CommSys and our Partner’s to figure out what was needed • We identified the transactions receiving the most requests and packaged them in logical groups • Packages are not limited to inquiry only and may also involve record entry, modification or deletion We provide these transaction groups under the caption of Additional Transaction Packages.
The Six Transaction Packages with multiple transactions in each group - Computerized Criminal History Inquiry (CCH) - Basic Entry (BEP) - Wanted Missing Persons Inquiry (WMP-I) - Wanted Missing Persons Entry/Modify (WMP-E) - Administrative and Operations Support (AOS) - Canadian Basic Inquiry via Nlets (CPIC-BI)
Other Transaction CJIS • There are other transactions that are not traditional database messages - such as: • Sending messages between agencies or • Looking up agency contact information Criminal Justice Information System • These other types of messages are a minority but they do exist and are discussed later in the document.
Alternative to Entry Packages Considering cost effective offerings:CommSys offers the CLIPSTM software product as a full function terminal CLIPSTM offers more advanced integration with our partners’ Records Management Software (RMS)
Why not implement all transactions for a state? • Could be done - but it is a lot of work and maintenance • Or you could use CLIPSTM • CLIPSTM can be integration in to your application using ConnectCICTM … that is for another Webinar - ;)
Entry/Modify Transactions BEPBasic Entry Package • The Basic Entry Package is a parallel to our standard Basic Inquiry Transaction Package. With Basic Inquiry there are five main groups of transactions: • persons, vehicles, guns, boats and articles
Administration and Operations AOSAdministration and Operations Support Package • Administrative Message (Teletype message - Agency to Agency) • Hit Confirmation (‘Hit Request’ message or ‘Hit Response’ message) • ORI Look-up (provides look-up ORI agency addresses) • Hazmat ( Specialized look-up of Hazardous Materials by UN number) • FAA Aircraft Registration Look-up (using either the aircraft registration/tail number or aircraft serial number) Typical 5 Admin/Ops Transactions:
Computerized Criminal History CCHComputerized Criminal History Inquiry Package • The CCH transactions are searches for Criminal History (Rap Sheet) information maintained by the FBI or individual state. • Interstate Identification Index (Often referred to as Triple I records) • In-state Criminal Histories (depending on severity of the crime) Criminal History is not an updatable file, therefore there is no entry option.
Wanted/Missing/Unidentified Person Inquiry WMPIWanted/Missing/Unidentified Person Inquiry Package • Missing/Unidentified Person • Supervised Release • Parole/Probation • Sex Offender • Order of Protection Typical 5 WMPI Transactions: