Department Critical Infrastructure Protection Implementing Plans to Protect Cyber-Based Infrastructure
Report No. 04-05
Office of the Inspector General
|EIS is a centralized computer network comprised of a message handling system, a Geographic Information System, office automation tools, the EPIC Internal Database, and an automated external databases query capability.
|Mercury is a record message traffic system providing DEA connectivity in offices within and outside the continental United States offices.
|Merlin provides DEA intelligence analysts with access to classified information and special reports, office automation capabilities, database information, and analytical tools
|Firebird, the general support system, is the DEA office automation infrastructure upgrade initiative and provides DEA personnel with an intuitive interface for automating the investigative report process, sharing case information, and performing analysis and administrative activities.
|Centralized Data Intercept
|The Centralized Data Intercept serves as a central collection and distribution point for the call data information related to Title III intercepts.40
|Model 204 Database Applications are mainframe investigative databases that support enforcement of laws.
|Electronic File Room
|The Electronic File Room is the central soft copy storage portion of the DEA SBU - investigative files.
|Wide Area Network
|DEA WAN consists of e-mail servers to support classified and SBU operations.
|GESCAN is the DEA's automated message handling system.
|Firebird nodes in Special Operations Division (SOD) and Command Center
|Firebird nodes consists of Firebird NT Server, Exchange, MS Office, peripherals workstations and LAN wiring for the backup of SOD and Command Center SBU NT file services and e-mail at the offsite facility in Chantilly, VA, to NT Server.
|Mainframe and Applications
|The FBI mainframes contain investigative and administrative applications necessary for the FBI to perform its designated duties in securing domestic security, enforcing Federal laws, and protecting the rights and interests of United States persons.
|Key Asset Database
|The Key Asset Database is a database of information concerning Key Assets within each field office's jurisdiction, establish lines of communication with Key Asset owners and operators to improve cyber and physical security, and enhance ongoing coordination with other Federal, state and local government entities, to ensure their involvement in the protection of critical infrastructures.
|CJIS WAN is the communications infrastructure that provides electronic connectivity between state/local law enforcement agencies, forensic/ballistic laboratories, and the FBI.
|InfraGard is an information sharing system for computer intrusion incidents and system vulnerabilities.
|IAFIS is a nationwide mainframe system that provides state of the art fingerprint identification processes and criminal history information for use by criminal justice and law enforcement agencies.
|NCIC 2000 is the nationwide criminal justice information application that provides the law enforcement community with immediate access to documented criminal information vital to effective criminal justice operations.
|Digital Storm Collection Systems
|The FBI's Digital Storm Collection Systems provide for the ability to operate Foreign Intelligence Surveillance Act (FISA) Electronic Surveillance activities and collect and remotely transfer FISA information.
|FBINET is a general support system which provides worldwide communications support to the FBI's investigative and intelligence applications at 500 locations in the United States and approximately 35 overseas locations.
|IISNET is a major application processing classified data. The system is considered to be the FBI's path for the Department of Defense TS/SCI network.
|Secure Mobile Radio System
|The FBI's Land Mobile Radio Systems supports secure, mobile, tactical communications throughout the United States.
|SAMNET is a major application and processes classified data. SAMNET is a messaging system and provides access to the Defense Special Security Communications System from approximately 60 field locations.
|CIS is a major application. CIS contains information on persons of interest to the INS, along with summary data from other INS systems.
|ENFORCE is an event-based case management system, integrating subject processing, biometric identification, allegations and charges, preparation and the printing of appropriate forms.
|IDENT is a two-fingerprint and photo image capture identification application that enables INS offers to quickly identify persons about whom INS has information.
|INSINC is the INS data communications infrastructure for non-classified processing.
|The MAN provides ATM services for 22 Department resources and facilities within the D.C. metropolitan area.
|JDC-D provides enterprise mainframe and server platform support for mission critical applications such as INS CIS.
|JDC-W provides enterprise mainframe and service platform support for mission critical applications such as DEA Model 204 Database Applications.
|JCN is a general support system providing the Department with a state-of-the-art high capacity communications backbone that consolidates individual Department components' telecommunications networks into one network to reduce costs, increase reliability, simplify network management, provide a common security approach, support emerging requirements of new applications, and foster interoperability and cooperation between components and non-Department clients.