Ragini Communications Inc.
Nationwide Suspicious Activity Reporting (SAR) Initiative - NATSARIN Solution   

The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Program Management Office (PMO) initiated operations in March 2010 with the challenge of ensuring that regardless of where in the country suspicious activity is reported, these potential indicators of terrorist activity can be analyzed and compared to other SAR information nationwide.

Challenge

Complying with NATSARIN creates following challenges :

  • Improve operational processes at federal, state, local, and tribal law enforcement agencies and fusion centers by providing capabilities to document, store, and share terrorism-related SARs.

  • Establish a country-wide a decentralized, distributed, and coordinated environment that to the greatest extent practicable, connects existing systems, builds upon existing systems capabilities currently in use across the Government, facilitates the sharing of information at and across all levels of security and incorporates protections for individuals’ privacy and civil liberties.

  • Protecting the privacy, civil rights, and civil liberties of Americans as well as developing relationships of trust among law enforcement, fusion centers, and the communities they serve—particularly immigrant and minority communities—to help prevent crime and/or terrorist related activities and keep our communities safe.



Solution

Key Capabilities

  • Generates Suspicious Activity Reports using organization specific workflow.

  • Get insight into potential suspicious activity reported by collating data from different sources as well as “connecting the dots” with integrated mapping and analytics capabilities.

  • Capture, evaluate and refine all your Legacy Systems’ structured as well as non-structured data through on-screen wizard based ETL / Data Mapping tools and bring that valuable data into Threat Assessment.

  • Provides Search capabilities that spans Shared Space Servers, eGuardian and DHS systems.

  • Attach video recordings, pictures, sound files, web links etc. to provide additional information, as it is, to assist investigation and decision making.

  • Secure web based Information Sharing software solution for collection, evaluation, analysis, and dissemination of intelligence data and criminal background information in a timely and effective manner in order to detect and/or prevent criminal or terrorist activity, and to solve crimes.

  • Mapping capabilities that makes geospatial analytics available to intelligence analysts that can also connect to additional internal or external data sources.

  • Collects, vet and prepares suspicious activity reports (SARs) as well as enables sharing with ISE Shared Spaces across USA as well as connects to eGuardian and DHS Systems.

  • Enable citizens to voluntarily submit tips / leads to State, Local and Tribal Law & Enforcement agencies, from which the fusion center can gather intelligence while analyzing suspicious activity reported.

The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) Program Management Office (PMO) initiated operations in March 2010 with the challenge of ensuring that regardless of where in the country suspicious activity is reported, these potential indicators of terrorist activity can be analyzed and compared to other SAR information nationwide.



Benefits
  • External connectivity to regional / federal agencies for accurate investigation of threats reported.

  • Out-of-box support for all key standards including but not limited to NIEM, LEXS, N-Dex and ISE SAR Functional Specifications v1.5.

  • Extensive Auditing of each step in SAR process as well as Reporting and Performance Evaluation based on SAR processing results.




Features

Category Feature
SLT-LE Website Suspicious Activity Reporting Website
 
SLT-LE Setup Setup Organization Details, structure and Jurisdiction
  Setup Privacy Policy
  Setup Training Programs
  Connectivity Details with other Agencies
 
Alert Manager Map based Suspicious Activity Alerts
  Identify Linkages with legacy crime data
  Terrorist Watch List Check
  Attach Research Documents and Notes
  External Agency Check
  Log Findings as per ISE-SAR version 1.5 Format
  Decision : Discard Alert / Send to Fusion Center
  Transmit Alert To Fusion Center
  PII Data Requests
 
State Fusion Center List of Suspicious Activity Case
  Identify ISE-SAR Part B Criteria
  Identify Linkages (incl. Shared Space Server Data Search)
  TSC & SLATT Checks
  Attach Documents, Notes & send PII Data Requests to SLT-LE
  Log Findings as per ISE SAR version 1.5
  Dismiss Case / Convert to ISE-SAR
  Create ISE-SAR & upload on Shared Space Server
 
Data Warehouse Process data file from multiple internal sources
  Process data file from multiple external sources
  Process data stream from multiple internal sources
  Process data stream from multiple external sources
Agency Compliance

U.S. Department of Homeland Security
http://www.dhs.gov/



Reports
Data Warehouse provides enhanced reporting. Key out of box report includes:

Title
Suspicious Activity Alerts

Process & Data Approach


Receive SAR tip from SLT-LE Tips website

Allows reporting of new suspicious activity / suspicious person related information to the SLT-LE.


Privacy Policy

To manage privacy policy related settings for the Law & Enforcement Agency (SLT or Fusion Center).


Summary of Alerts

This screen shows suspicious activity alert information by date, status, location or zip code.


Identify linkages, Terrorist List Check

Reviewer will check suspicious activity data against terrorism related watch lists.


Validation & Finalization By SLT-LE Chief Sheriff

Shows Alert Decision - Dismiss alert, Forward alert to LE Operations Channel or refer to State / Major city Fusion Center.


Convert Case to ISE-SAR

Our solution provides ability to convert case to ISE-SAR and to be posted on Shared Space Server or to be sent to Federal SBUs.


 

Summary of Audit Per Application

 

Nationwide SAR Initiative | Department of Homeland Security | Suspicious Activity Report | Department of Justice | Intelligence Reform and Terrorism Prevention Act of 2004 | Bureau of Justice Assistance | Federal Bureau of Investigation | Information Exchange Package Documentation | National Information Exchange Model | FBI — Joint Terrorism Task Forces| National Counterterrorism Center| RISSNET | LEO | HSIN | Logical Entity Exchange Specification| iWatch | The International Association of Chiefs of Police| Information Sharing Environment | Joint Counterterrorism Assessment Team

Copyright © Ragini Communications Inc. 1996 -

Best viewed in 1024 x 768 Resolution Sitemap