Convergence of Technologies in Corrections - PowerPoint PPT Presentation

1 / 52
About This Presentation
Title:

Convergence of Technologies in Corrections

Description:

... to enable evidence-based practices in collaboration ... Case/evidence based Plans. Automation in Supervision & management. PRDoC General Guidelines ... – PowerPoint PPT presentation

Number of Views:137
Avg rating:3.0/5.0
Slides: 53
Provided by: DOI1
Category:

less

Transcript and Presenter's Notes

Title: Convergence of Technologies in Corrections


1
Convergence of Technologies in Corrections
  • Design methodology and preliminary outcome from
    PRDoC
  • Presented by
  • Luis J Cruz-Rivera
  • Consulting Manager
  • CCG Corp

2
Vision
  • To build dynamic organizations through systemic
    integration of data and knowledge to enable
    evidence-based practices in collaboration with
    community and justice partners.

Integration Continuum
Evidence-
Evidence-
Evidence-
Evidence-
based
based
based Principles
Practice
based
Practice
Practice
Organizational
Org.
Org.
Development
Intergre-
Integra-
Org.
Develop-
Develop-
Integre-
Develop-
tion
tion
tion
ment
ment
Integration
ment
No Integration
Full Integration
3
Introduction
  • Justification Getting the right information, to
    the right people, when needed and in usable form
  • Need Sharing critical information at key
    decision points throughout to all needed
    stakeholder
  • Scope Move away from linear enterprise solutions
    to more elastic and modular/scalable solutions
  • Objectives
  • Improve Public Safety and Security
  • Enhance knowledge exchange and availability in
    DOCs
  • Gain Operational Efficiencies and Improve ROI

4
Universal Principles
  • Data should be captured at the originating point,
    rather that trying to reconstruct it down line
  • Data should be captured once and used many times
  • Integration should be driven by the operational
    systems of participating entities
  • DoCs should retain the right to design, operate
    and maintain systems to meet their own
    operational requirements
  • Security and privacy of information will be
    priorities in development of these capabilities

New Technologies
ICIS
VoIP, network reconfig, Sensors, data Mining,
behavior Modeling, etc
Telejustice
Telemedicine
Possibly existent
5
Convergence and Integration
  • The convergence of information and behavior
    information to justice, public safety, and
    correctional systems allows for new security
    imperatives and operational paradigms.
  • Integration of dissimilar data sources and
    technologies is needed to prevent crisis and
    respond in timely fashion
  • Provide major incident response and management
  • Preparation and response to catastrophic
    disasters
  • Day-to-day management and operations of justice
    agencies at the state and local levels throughout
    the justice enterprise.

Users
Stakeholders
6
Net effect
  • Compliance
  • Security controls and processes reduce risk
  • Helps avoid loss due to non-compliance without
    additional labor costs
  • Operational Efficiencies
  • Enable more commitment to automated business
    processes which delivers a lower cost to run
    operations.
  • Provides visibility and business agility which
    delivers a competitive advantage.
  • Supports scalability and interoperability
  • Measurable and Positive decision models
  • Increases adoption of streamlined services or
    data models
  • Increases retention and trust in electronic
    intelligence transactions.
  • Supports 24/7 business operations and access.
  • Cutting costs
  • Improves and streamlines processes which supports
    both business and technology requirements.
  • Reduces future growth costs.
  • Scales organizational security.
  • Increases organizational productivity.

7
Case DoC of PR aka DCR
  • 11 Correctional compounds within 100x35 mile area
  • 6 maximum security containing compounds
  • Varying terrain/vegetation
  • Networked through PRI/FR/PSTN
  • 6M in reoccurring communications related costs

8
DoC of PR
  • Focus on contraband and violence reduction
  • Utilizing progressive risk management policies
  • Large gang forces within population
  • Emphasizing security and communication
  • All staff expected to model appropriate behavior
  • Transition and case planning begins at intake
  • Systemic approaches regarding prisoner handling
    and surveillance.
  • Limited operational budget
  • Limited convergence and enterprise type IT
    infrastructure

9
System desired outcome
  • Local level
  • Risk assessment
  • System Collaboration
  • Secure Residential monitoring
  • VideoIP visitation/arraignment
  • Reductions information lag/latency
  • Case/evidence based Plans
  • Automation in Supervision management
  • DoC level
  • Multi-source data collection
  • Scalable configuration and operation Guidelines
  • Layered intelligence oversight-command and
    control
  • Private network overhaul
  • Resource ownership and improved utilization
  • Cost reduction mechanisms
  • Investigative tools

10
PRDoC General Guidelines
  • The integrated technology resource model
    encourages focus on
  • Developing the highest productivity for
    implementing solutions at the organization and
    local levels.
  • Providing a positive control environment and a
    focus on improving organizational system
    capacity.
  • Focus on systemic change versus single events.

11
PRDoC main concerns
  • Consolidation must occur while maintaining the
    existing service levels.
  • Principles of Consolidation
  • Do no harm during or as a result of consolidation
    - all services remain at contractual service
    levels or better.
  • Execute consolidation with absolute integrity and
    appropriate transparency.
  • Maintain open two-way communications with all
    stakeholders.
  • Previous investment retention
  • Flexible platform increases interoperability for
    phased in rollout
  • Minimize upfront costs
  • Antiquated databases
  • Merge them or implement middleware solution
  • Re-key if necessary
  • Understaffed correctional IT units
  • Complex system interfaces
  • Single vs multi-vendor support
  • Learining curve
  • System security

12
New PRDoC Structure
Solution paradigm
Public-Private Interaction
Governmental Functions
Components
Governance
EmergingTechnology
Component Voids Candidate Components
Priorities Policy Recommendations
13
Embedded systems technologies
tools/platform reports
Self service solutions Query, reports,
statistics
applications
14
Converge Integrate Consolidate
  • Converge (30 - 60 days)
  • Eliminates existing multiple hierarchies.
  • All reports flattened and processed by
    subscriber key
  • Duplicate processes, procedures, tools to
    continue through this merge stage for local
    leadership.
  • Follows interim processes until one process,
    procedure, or tool is selected and the
    integration can begin.
  • Integrate (next step)
  • Select the best processes, equipment, and tools
    (including HW/SW) to be utilized across the
    agency on a requirements based design.
  • Incorporate the selected processes, procedures,
    and tools into one for each functionality - in a
    prioritized ranking as it makes sense.
  • Make interfaces organic to non technical
    individuals to minimize training overhead and
    application utility.

15
Building blocks and key technologies
  • Technology evolution model (from the ISO model 7
    Layers convergence Telecom and Computers
    VoIP)
  • Multi - Service level
  • Middleware level
  • Multi access level
  • Today what is key is the Service level and the
    Middleware level
  • SOA Service Oriented Architecture under dev.
  • Middleware which is handling network selection,
    mobility, Security levels, QoS handling, multiple
    formats
  • Access technology enables scene analysis and
    preventive alarms

16
Network integration tools
  • Application / voice terminals
  • Unified treat management
  • QoS management appliances
  • Layered network sectioning
  • RFID
  • Data-mining
  • Statistical pattern manager

17
Working assumptions
  • Users have helped define the Services they want,
    but they do not care about the technology used
    (If standardised) as long as it meets their
    needs
  • Interoperability has three levels
  • Operational (the USERS main interest)
  • System (Mobility, QoS, Security)
  • Technical (Wired, wireless, fixed and mobile
    accesses)
  • Legacy systems interconnection and migration is
    key
  • Roadmap is needed with steps due to rapid
    technology evolution.

18
Perspective Business Process View
Process Definition, Decomposition, and Depiction
DOC work Areas
Value Chain
Level 0
BusinessUnits
Internal Functions
Sub-Functions
Process Attributes
Level 1
Lead Processes
Level 2
Line Processes
Level 3
Sub-Processes
Level 4
Activities
Agency Level of Detail As designated by customer
Level 5
Tasks
Level n
19
Work Area Ownership
20
Perspective Business Process View
21
Perspective Process Implementation
Performance Implementation Model Outcomes,
Measurements, Metrics
Business Base Model
Service Component Capture Model
Technical Roadmap Model
Support Delivery of Services
Rule set
Technologies
Platforms J2EE .NET Windows NT
Knowledge Mgmt CRM Content Mgmt Collaboration
models Searchs Portals and self service Behavior
module
Regulatory Management
Policy and Guidance Devel. Public Comment
Tracking Regulatory Development Rule Publication
Data Mgmt ODBC JDBC Business Logic
Business lines and functions
Supporting technology and standards
Enabling capabilities, components, and services
Data and Information Reference Model
Classification, Categorization, XML, Sharing
Component-Based Architecture
Service Components
Service Layers
Service Types
22
Perspective Process Implementation
Top level Environment (top Agency Boundary)
Integration and Convergence (Service Component
Access)
Internal Environment (Within Agency Boundaries)
Service Platform
Component Framework (n-Tier Architecture)
Security Layer
CORE Service Interface
Back Office / Legacy Assets
Self Service Interface
Infrastructure
Service Integration
Infrastructure
Access Channels
Delivery Channels
Presentation / Interface Layer
Service Requirements
Service Transport
Business Logic Layer
Data Interchange
Data Management
Infrastructure
Service Access and Delivery
Component Framework
Service Platforms Infrastructure
Service Interface and Integration
23
Police

Prosecution
DOC
Local Agencies
Courts
Data Warehouse Push/pull
Middle- ware Servers
DOC Net
Behavior models
Commo Cntrl network
Survelance
Sensor network
ICS / existing framework
24
Sensor networks
  • VideoIP- real time asset tracking and statistical
    behavior models
  • Contraband detection
  • Escape attempts
  • Incident and intelligence reporting
  • RFID
  • Data mining
  • Illicit communications profiles

25
Site Connectivity
...up to 16 separate BW segments
Agency wide VPN
Sensor networks
Voice over IP
Shared data services
Security Camaras
Public internet
LAN/WAN
26
Bandwidth requirement
27
SAFECOMs model for national incident management
system
Magnitude of Event
Local jurisdiction, multiple disciplines
One region, multiple disciplines
Local jurisdiction, single discipline
Multiple regions and multiple disciplines
28
Information Flow
Data sources
Traditional WANs
  • Voice
  • voice only, voice/data, inquiry/retrieval,
    conferencing, store/forward, recording
  • Video
  • conferencing, screen capture, interactive,
    recording
  • Data
  • interactive, data entry, batch, file update, file
    transfer, file sharing
  • Image
  • fax, graphics, conferencing, interactive,
    store/forward
  • Telephone lines are slow but inexpensive at 64
    kilobytes per second (baud)
  • ISDN telephone lines integrated service digital
    network is faster at 256 kb
  • ATM asynchronous transfer mode gt1Mb
  • Satellite expensive

Information Monitoring network management,
security, integrity, licensing, malpractice
avoidance
29
Connectivity design options
Smart Antenna
Mesh Access Point
2
1
30
Networking Paradigm
  • Mesh network like provision of connectivity
  • Select mesh nodes that give the best external
    access
  • Provide extended access for legacy nodes

31
QoS Mesh Infrastructure
  • Core nodes will have WLAN functionlity
  • Legacy WLAN clients can connect to these nodes
  • Enables aggregation of external access capability

Service Network 1
CDMA2000
Internet Connectivity
DSL
Service Network 2
WiMax
Fiber
Legacy WLAN clients
Service Network n
Satellite
New Infrastructure
32
Modular architecture Architecture
Other
New Sensors
Ad-hoc
Disimilar Providers in DoC network
New Technology
New Technology
Other
Cellular (2, 2, 3G)
UWB
B3G, 4G
New Sensors
Mobile Broadband
New Technology
Trunked
New Sensors
  • Technical QoS
  • coverage
  • Standardizationof services

Broadband
Global Perimeter
33
Collection Protocols
  • Improved collection methods increase accuracy and
    precision by aggregating many rule or
    location-sensing systems to form hierarchical and
    overlapping levels of resolution
  • Robustness/redundancy when some location-sensing
    system become unavailable
  • Multi modal backhauls or burst frequency becons
  • Indirect data collection and knowledge indexing
    models
  • Issue assign weight/importance to the different
    location-sensing systems

34
Electronic Location Sensing Techniques
  • Triangulation
  • Lateration
  • Angulation
  • Scene Analysis
  • Proximity
  • Angulation
  • 2D requires
  • 2 angles and 1 known distance
  • Phased antenna arrays

35
Triangulation - Lateration
  • Types of Measurements
  • Direct touch
  • Time-of-flight
  • (e.g., sound waves travel 344m/s in 21oC)
  • Signal attenuation
  • calculate based on send and receive strength
  • attenuation varies based on environment
  • Phase Array Antennas
  • Multiple antennas with known separation
  • Each measures time of arrival of signal
  • Given the difference in time of arrival and the
    geometry of the receiving array, we can compute
    the angle from which the emission was originated
  • If there are enough elements in the array and
    large separation, the angulation can be performed

36
International Biometric Group 2001
Biometric Market Report 1999-2005
  • Fingerprint and Middleware market will lead
    biometrics market in future
  • Projected Revenue of Fingerprint and Middleware
    will occupy 40 of Total Market at 2005

37
Collection System Properties
  • Physical symbolic tracking
  • Absolute vs. relative locations
  • Localized or remote computation
  • Accuracy precision requirements
  • Scalability
  • Device identification/classification/recognition
  • Cost
  • Limitations dependencies (e.g., infrastructure
    vs. ad hoc)
  • Multiple modalities (RF, ultrasonic)
  • Hardware availability
  • Privacy requirements

38
DoC-Public Safety Value Proposition
  • Standardization and interoperability
  • Ability to leverage common information
  • Respects need for independence
  • Improved information management
  • Better linkages.
  • Service improvement
  • More efficient tooling
  • Automated routing sheets
  • Common tooling (e.g. MS suite, BI, RDIMS)
  • Improved ability to manage files efficiently and
    effectively
  • Improved workload distribution
  • Exchange/collaboration of resources on high
    profile investigations.
  • Efficient use of resources
  • Improved knowledge management and transfer
  • Hyperlinked to data sources
  • Access to specialized knowledge and skills
  • Sharing benefits and best practices
  • Cost savings.

39
Connection Strategy Map
40
Compliance and/or Operational Management and
Reporting
Validate Audit
Incident Metrics
Audit Resources
Generate Reports
  • How many incidents have occurred?
  • How many requests were self service?
  • Who approved access?
  • Monitor usage against security policies
  • Track application usage
  • Identify invalid accounts
  • Recertify discrepancies
  • Report access authorizations
  • Review evidence of controls
  • Review audit logs
  • Document exceptions

Central Logging
  • Sustained Compliance
  • Improved Automation
  • Reduced Costs

Central Audit Collector and Report Generator
Develop/Acquire
Review
Manage
Implement Change Request
Verify
Deliver And Support
New ApplicationRequest
Reduce application identity management
costs Reduce application cycle times Enhance
application security
  • Develop/acquirenew application
  • Validate withsecurity standards
  • Integrate with common security
  • Acceptance tests
  • Manage users viaProvisioning system
  • Security review
  • Check complianceto security standards

Workflow
Middleware - Directory
Provisioning System
Roles Legend
IT Operations Manager
Internal Audit Manager
Application Manager
Business Manager
End User
Security Manager
Applications Developer
HR
41
Example Investigation Service Delivery Model
42
Value Realization Roadmap
Efficiency
New Value Creation
Consider projects in the Quick Wins quadrant
first.
Operational Excellence
  • Breakthrough Strategies

High
  • Dynamic networks
  • Intelligence Collaboration
  • Process Optimization

Project Prioritization Matrix
Business Criticality
  • New Fundamentals

Rational Experimentation
  • Must Haves

Quick Wins
High
  • Dynamic Networks
  • Intelligence Collaboration
  • Process Optimization

Low
Market Impact
  • Money Pits

Low Hanging Fruit
Low
High
Level of Innovation
  • Operational impact
  • Points to consider
  • Benchmarking Best Practices (Internal/External
    )
  • Competitive Landscape Analysis
  • Solution Analysis (in market)

Low
Ease of Execution
Low
High
43
PRDoC benefits
  • Ability to provide consistent services and
    applications to all facilities
  • Convergence of networked systems
  • Enhanced redundancy for networked systems
  • Reduction of hardware/software maintenance
    expense
  • Reduction in transportation expense
  • Reduction in personal services costs
  • Minimize public safety risks
  • Enable and position DOC to take full advantage of
    technological advancements when it makes sense to
    do so.

44
PRDoC benefits
  • Consolidate Regionalize Data Servers
  • Information Systems servers consolidated by 85
  • Correctional Industries servers consolidated by
    60.
  • Resulting in hardware and software maintenance
    simplified by Unified threat management gateways
  • -Reoccurring data costs decreased by 65

45
PRDoC benefits
  • Expanded voice and video-conferencing
  • additional site connections established
  • Video conference use projected to increase in
    office by 50
  • Current uses shall include Telemedicine, Federal
    hearings and Arraignments, INS hearings, Social
    Security hearings, staff meetings training
  • Results in enhanced public safety by not
    transporting inmates, cost savings in
    transportation,staff time, per diem, increases of
    staff production.

46
PRDoC benefits
  • Voice PBXs will migrate to VoIP to minimize
    dependence on PSTN
  • Consolidation to 1 Call Accounting System with
    redundant administration server
  • Results in reduction of toll charges,hardware and
    software maintenance costs, and staff
    productivity while protects current investments.
  • Use VoIP network with touch enabled application
    IP phones for multilayer integration.

47
Summary Issues and Benefits
Key Convergence and Integration Benefits
Key Issues
  • Large amounts of paperwork
  • Time and fuel wasted returning tracking logistics
    and data
  • Manual update of records
  • Speed of access to information
  • The need to do more with less
  • Less paperwork, leading to greater efficiency and
    increased accuracy
  • Downtime reduced by providing access to intel and
    info
  • Visibility of current status, leading to more
    efficient utilisation of resources
  • Improved speed of response to incidents and
    increased user satisfaction
  • Enhanced officer and inmate safety
  • Meaningful management information leading to
    improved performance measurements
  • Less stressful control room environment, leading
    to higher levels of worker satisfaction and
    service provision

48
Summary Best Practices
  • Build an enterprise-wide framework for secure,
    real-time information exchange that specifically
    universal objectives
  • Leverage investment in existing, legacy systems
  • Identify and define operational business rules
    for information exchange and reengineer where
    necessary and/or beneficial
  • Build data transformation models and open-system
    standards to enable dynamic exchange
  • Build the capacity of native agency systems and
    operational policies to ensure effective
    exchange
  • Constantly measure tangible objectives and
    realign projects/resources to achieve best ROI.

49
Summary Universal Resources
  • Recognition that business objectives are driving
    the demand for information sharing, not
    technology
  • Research tools demonstrate the universal nature
    of information exchange throughout the whole of
    the justice related enterprise in PR
  • XML standards are emerging that will enable truly
    global exchange of information
  • Evolution of technology
  • We have evolved from a Mainframe-centric world to
    a PC-centric world, now we need to move into a
    Network-centric world
  • PRDoC is shifting into a Content access and
    control paradigm.

50
The Future
  • Real time media Real time Intelligence
  • Greater depth of information sharing
  • Ambient Intelligence
  • Toll-less communications
  • Off-board trend mapping
  • Limitless over air reprogramming
  • Regional Control Rooms
  • Self healing and controlling networks
  • Safer and better informed assets
  • Long term cost savings

51
Final Lessons Learned
Convergence will streamline operations
52
Thank you.
CCG Corp. 1 443 418 1283
  • send questions to ljcruz_at_cruz-corp.com
  • Soon To be
  • ljcruz_at_vergecom.com
  • As of May 22, 2006.
Write a Comment
User Comments (0)
About PowerShow.com