Suspicious activity reporting
This presentation is the property of its rightful owner.
Sponsored Links
1 / 25

Suspicious Activity Reporting PowerPoint PPT Presentation

  • Uploaded on
  • Presentation posted in: General

Shaping the Future of Public Safety and Collaboration. XML Exchange Development. Deploy. Requirements. NIEM. Mo del Data. Test. Suspicious Activity Reporting. Build Exchange. Generate Dictionary. Overview – Public Sector NIEM Team, December 2011.

Download Presentation

Suspicious Activity Reporting

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript

Suspicious activity reporting

Shaping the Future

of Public Safety and


XML Exchange Development







Suspicious Activity Reporting





Overview – Public Sector NIEM Team, December 2011

Suspicious activity reporting

The following is intended to outline Oracle general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions.

The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.




In the ten years since 9/11/2001, we have seen the information sharing challenges in the public safety arena expand beyond terrorist threats to encompass a broad set of criminal justice, emergency management, intelligence, and other homeland security activities.Has the power and breadth of available information sharing solutions kept up with the scale and scope of the problem? What solutions are needed for 2020 problems? By examining current architecture and data sharing methods, the community can address the needs that must be met to deliver the next generation of pragmatic solutions with standards-based information sharing.

Community collaboration and safety

Community, Collaboration and Safety

Social Challenges and Community Involvement

Enabling Technologies – SAR v2

Standards and Adoption Roadmap

Q & A

Social challenges

Society Today

Social Challenges

National sar initiative position

National SAR Initiative Position

Focus is on law enforcement and financial services sector rather than broad citizen and community involvement

ISE coordination:

Current NSI sites:

  • Current thinking of the office of the Director of National Intelligence cites suspicious behavior as “observed behavior that may be indicative of intelligence gathering or pre-operational planning related to terrorism, criminal or other illicit intention. Behavior that could be considered suspicious and potentially tied to terrorism, and thus warrant a report, includes surveillance, photography of facilities, site breaches or physical intrusions, cyberattacks and the examination of security.”

Budget restrictions v policing scope

Budget Restrictions v Policing Scope

  • America continues to allocate significant budgets to law enforcement and policing

  • The key to effective policing has always been enabling citizen participation combined with responsiveness and follow through

  • Policing has to cover an ever increasing raft of areas

  • How to leverage information technologies and communications tools to allow limited police resources to do more?

  • Better first responder coordination

Public safety areas and scope

Public Safety Areas and Scope

Seemingly unconnected activity and participants provide key markers to intended criminal or terrorist patterns

Citizens and averting future tragedy

Citizens and Averting Future Tragedy

  • Who knew that Anders Behring Breivikwas a disturbed fanatic planning to detonate a car bomb and then attack teenagers on a retreat island?

  • Who knew Michael Vick was involved in illegal dog fighting rings from his property?

Who knew that NordineAmrani had acquired three hand grenades a shotgun and an automatic weapon?

Vision for collaborative sar initiative

Vision for Collaborative SAR initiative

  • Empowering community collaboration across all aspect of public safety not just terrorism and priority government sector targets

  • Providing a complete suite of solutions, not just islands of coordination

  • Integrating first responder systems to allow coordination to maximize resources

Information sharing has critical role

Information Sharing has Critical Role

  • Can act to bring together communities and law enforcement to combat challenges posed by world today

  • Provide people with sense of involvement and security

  • Combines Mobile, Social and Internet tools

  • Enable reporting and collaboration between community and law enforcement

Enabling technologies

NIEM – National Information Sharing Model

Enabling Technologies

LEXS – Logical Entity eXchange System

Suspicious Activity Report (SAR) version 2

Capabilities and requirements

Capabilities and Requirements

  • Ensure privacy / security with built-in oversight and auditing to minimize risks

  • Reduce costs through use of open standards and common shared infrastructure and deployments (e.g. cloud computing, mobile communications networks)

  • Rapid response to events - natural disaster and man made

  • Public events protection and support

  • Secure first responder integration and coordination tools

  • Secure communications infrastructure with fault tolerance and security

Suspicious activity reporting

NIEM SAR – standards based approach

  • NIEM is a joint DOJ / DHS / HHS program created to promote standardization of information exchange for cross jurisdictional information sharing.

  • NIEM provides the tools for enabling interoperability at the data layer within and acrosssystems supporting information sharing, while preserving investments in current technology and optimizing new technology development.

  • Going International – Canada, Mexico, EU

Components of NIEM

Common Language(Data Model Lifecycle)

Repeatable, Reusable Process

(Exchange Specification Lifecycle)

Built and governed by the business users at Federal, State, Local, Tribal and Private Sectors

Existing sar v1 5 content model

Existing SAR v1.5 content model

Workflow support unclear

Control unclear

Specific to narrow 911 terrorism incident profile

Sar v2 0 draft content model

SAR v2.0 (draft) content model

  • Cleaner and enhanced data model

  • Extended capability and flexibility

  • Improved workflow alignment

  • Better internationalization support







Example sar complex event processing

Example – SAR + Complex Event Processing





Transport/Goods Theft






SAR Dashboard






SAR 2.0







Vehicle “XYZ”

State MVA


Suspicious Activity +Vehicle “XYZ” +


Desk Officer

Reviews and Assigns

Email Alert


Incident Report Workflow

Activity Location Mapping



Some sar application snap shots

Some SAR application snap shots

Sar mobile device interface

SAR Mobile Device Interface

User can browse and select phone camera image

User can click here to allow sharing of the GPS coordinates from their phone location

Sar tracker review dashboard

SAR Tracker Review Dashboard

Sar review with mapping

SAR Review with Mapping

Standards and adoption roadmap

Toward 2020 Policing and Community Coordination

Standards and Adoption roadmap

Toward suspicious activity report v2 0

SAR components

  • SAR v1.5 components

  • NIEM core dictionary

  • LEXS 3.1.4 dictionary

LEXS components referenced


NIEM core components




New structure components

based on NIEM + SAR + new

Definitions stored as syntax neutral canonical XML

Toward Suspicious Activity Report V2.0

Dictionary Collection


Namespaces of dictionary components

Summary of technologies

Summary of Technologies

  • Short term initiatives

    • SAR V2.0 standard IEPD

    • Proof of Concept verification

  • Medium term objectives

    • Fusion Center integration

    • Open platform architecture

    • Cloud availability, mobile alerts and reporting

    • First responders coordination

  • Long term vision

    • Advanced policing techniques

    • Analysis, Events, Reporting, Trends (e.g. FBI UCR)

  • Suspicious activity reporting

    Q & A

    • Resource Center link


    SAR built with CAM editor toolkit from:

  • Login