Sentinel (FBI)

Last updated

Sentinel is a software case management system developed by the US FBI with the aim to replace digital and paper processes with purely digital workflows during investigations. [1] There was a previous failed project called Virtual Case File.

The project started in 2006 with a $425 million budget. After several delays, new leadership, a slightly bigger budget, and adoption of agile software development method, [2] Sentinel was completed under budget and was in use agency-wide on July 1, 2012. [3]

An audit of the program in 2014, two years after completion, revealed ongoing issues with Sentinel's search function, with only 42 percent of surveyed FBI employees indicating that they often found results they needed. [4] [5] In spite of this, the audit was broadly positive, and found that most FBI employees reported that Sentinel enhanced their ability to enter and share case information.

Related Research Articles

Federal Bureau of Investigation Governmental agency belonging to the United States Department of Justice

The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, the FBI is also a member of the U.S. Intelligence Community and reports to both the Attorney General and the Director of National Intelligence. A leading U.S. counter-terrorism, counterintelligence, and criminal investigative organization, the FBI has jurisdiction over violations of more than 200 categories of federal crimes.

Unisys American global information technology company

Unisys Corporation is an American global information technology company based in Blue Bell, Pennsylvania, that provides IT services, software, and technology. It is the legacy proprietor of the Burroughs and UNIVAC line of computers, formed when the former bought the latter.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer, or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

Leidos, formerly known as Science Applications International Corporation (SAIC), is an American defense, aviation, information technology, and biomedical research company headquartered in Reston, Virginia, that provides scientific, engineering, systems integration, and technical services. Leidos merged with Lockheed Martin's IT sector in August 2016 for Information Systems & Global Solutions business to create the defense industry’s largest IT services provider. The Leidos-Lockheed Martin merger is one of the biggest transactions thus far in the consolidation of a defense sector. Leidos works extensively with the United States Department of Defense, the United States Department of Homeland Security, and the United States Intelligence Community, including the NSA, as well as other U.S. government civil agencies and selected commercial markets.

Deloitte Touche Tohmatsu Limited , commonly referred to as Deloitte, is a multinational professional services network with offices in over 150 countries and territories around the world. Deloitte is one of the Big Four accounting organizations and the largest professional services network in the world by revenue and number of professionals, with headquarters in London, England.

Harlequin (software company)

Harlequin was a technology company based in Cambridge, UK and Cambridge, Massachusetts. It specialized in application software for printing, graphics, law enforcement, artificial intelligence, and in implementations of programming languages. Harlequin employees sometimes referred to themselves as "The 'Late Binding' company" and the firm eventually evolved into a think tank for advanced technologies.

TrueCrypt Discontinued source-available disk encryption utility

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, or encrypt a partition or the whole storage device.

Norton AntiVirus Anti-virus software

Norton AntiVirus is an anti-virus or anti-malware software product, developed and distributed by NortonLifeLock since 1991 as part of its Norton family of computer security products. It uses signatures and heuristics to identify viruses. Other features included in it are e-mail spam filtering and phishing protection.

Carnivore (software)

Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation (FBI) that was designed to monitor email and electronic communications. It used a customizable packet sniffer that could monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software.

In library and archival science, digital preservation is a formal endeavor to ensure that digital information of continuing value remains accessible and usable. It involves planning, resource allocation, and application of preservation methods and technologies, and it combines policies, strategies and actions to ensure access to reformatted and "born-digital" content, regardless of the challenges of media failure and technological change. The goal of digital preservation is the accurate rendering of authenticated content over time. The Association for Library Collections and Technical Services Preservation and Reformatting Section of the American Library Association, defined digital preservation as combination of "policies, strategies and actions that ensure access to digital content over time." According to the Harrod's Librarian Glossary, digital preservation is the method of keeping digital material alive so that they remain usable as technological advances render original hardware and software specification obsolete.

Virtual Case File was a software application developed by the United States Federal Bureau of Investigation (FBI) between 2000 and 2005. The project was officially abandoned in April 2005, while still in development stage and cost the federal government nearly $170 million. In 2006, the Washington Post wrote "In a 318-page report, completed in January 2005 and obtained by The Post under the Freedom of Information Act, [the Aerospace Corporation] said the SAIC software was incomplete, inadequate and so poorly designed that it would be essentially unusable under real-world conditions. Even in rudimentary tests, the system did not comply with basic requirements, the report said. It did not include network-management or archiving systems—a failing that would put crucial law enforcement and national security data at risk"

Epic Systems Healthcare software company

Epic Systems Corporation, or Epic, is a privately held healthcare software company. According to the company, hospitals that use its software held medical records of 54% of patients in the United States and 2.5% of patients worldwide in 2015.

North Carolina Department of Health and Human Services

The North Carolina Department of Health and Human Services is a large state government agency in the U.S. state of North Carolina, somewhat analogous to the United States Department of Health and Human Services. The NCDHHS has more than 19,000 employees. The NCDHHS has its origins in the former North Carolina Department of Human Resources (DHR). The head of NCDHHS (Secretary) is appointed by the Governor of North Carolina and is a member of the North Carolina Cabinet in the executive branch of the North Carolina government. The NCDHHS was created in 1971.

FBI Ten Most Wanted Fugitives, 2000s Wikimedia list article

The FBI's Ten Most Wanted Fugitives during the 2000s is a list, maintained for a sixth decade, of the Ten Most Wanted Fugitives of the United States Federal Bureau of Investigation. At any given time, the FBI is actively searching for 12,000 fugitives. During the 2000s, 36 new fugitives were added to the list. By the close of the decade a total of 494 fugitives had been listed on the Top Ten list, of whom 463 have been captured or located.

Trailblazer Project

Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.

Thomas A. Drake

Thomas Andrews Drake is a former senior executive of the U.S. National Security Agency (NSA), a decorated United States Air Force and United States Navy veteran, and a whistleblower. In 2010, the government alleged that Drake mishandled documents, one of the few such Espionage Act cases in U.S. history. Drake's defenders claim that he was instead being persecuted for challenging the Trailblazer Project. He is the 2011 recipient of the Ridenhour Prize for Truth-Telling and co-recipient of the Sam Adams Associates for Integrity in Intelligence (SAAII) award.

Palantir Technologies is a public American software company that specializes in big data analytics. Headquartered in Denver, Colorado, it was founded by Peter Thiel, Nathan Gettings, Joe Lonsdale, Stephen Cohen, and Alex Karp in 2003. The company's name is derived from The Lord of the Rings where the magical palantíri were "seeing-stones," described as indestructible balls of crystal used for communication and to see events in other parts of the world.

The Science and Technology Branch is service within the Federal Bureau of Investigation that comprises three separate units. These are Forensic Science, Operational Technology, and Information Sharing. The goal when it was founded in July 2006 was to centralize the leadership and management of the three units. The mission of the STB is discover, develop, and deliver innovative science and technology so that intelligence and innovative investigation is enhanced.

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems. The threat may involve fraud, the theft of confidential or commercially valuable information, the theft of intellectual property, or the sabotage of computer systems. The insider threat comes in three categories:

Election audit

An election audit is any review conducted after polls close for the purpose of determining whether the votes were counted accurately or whether proper procedures were followed, or both.

References

  1. "FBI's New Sentinel System: Exclusive Look". Archived from the original on 2012-04-02. Retrieved 2012-04-02.
  2. FBI puts Sentinel on hold
  3. "FBI's Sentinel Project: 5 Lessons Learned". InformationWeek. 2012-08-02. Retrieved 2014-07-29.
  4. "Upbeat IG Report Can't Hide FBI's Big Computer Blues". Newsweek. 2014-09-24. Retrieved 2018-12-02.
  5. "Audit of the Status of the Federal Bureau of Investigation's Sentinel Program" (PDF).