Exhibit 300: Part I: Summary Information and Justification (All Capital Assets)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 48

FBI Next Generation Identification (NGI)

Exhibit 300: Part I: Summary Information and Justification (All Capital Assets)
I.A. Overview

1. Date of Submission: 2. Agency: 3. Bureau: 4. Name of this Capital Asset: 5. Unique Project (Investment) Identifier: (For IT investment only, see section 53. For all other, use agency ID system.) 6. What kind of investment will this be in FY2008? (Please NOTE: Investments moving to O&M ONLY in FY2008, with Planning/Acquisition activities prior to FY2008 should not select O&M. These investments should indicate their current status.) 7. What was the first budget year this investment was submitted to OMB?

8/6/2006 Department of Justice Federal Bureau of Investigation FBI Next Generation Identification (NGI) 011-10-01-04-01-3199-00 Mixed Life Cycle

FY2006

8. Provide a brief summary and justification for this investment, including a brief description of how this closes in part or in whole an identified agency performance gap:
The Next Generation Identification (NGI) will be a major upgrade to the current Integrated Automated Fingerprint Identification System (IAFIS) that will provide new functionality, as well as, improve upon current functionality. The NGI, because it is a major upgrade to the existing IAFIS, was included in a previous IAFIS OMB 300 submission. In 2005, the NGI was separated from the IAFIS Exhibit 300 for Management Control purposes based on guidance from the FBI's Office of the Chief Information Officer (OCIO). The NGI Program is a compilation of initiatives that will either improve or expand existing biometric identification services. The NGI Program will accommodate increased information processing and sharing demands in support of anti-terrorism. As a result of the NGI initiatives, the FBI will be able to provide services to enhance interoperability between stakeholders at all levels of government, including local, state, federal, and international partners. This will accommodate the increasing need for pre-employment background checks, licenses, and will support the increase in border patrol and entry/exit checks. The NGI will allow the FBI to establish a terrorist fingerprint identification system that is compatible with other systems; increase the accessibility and number of the IAFIS terrorist fingerprint records; and provide latent palm print search capabilities. The NGI Study Contract was awarded to Intellidyne, L.L.C. on July 1, 2005. Intellidyne, L.L.C. and CJIS NGI representatives jointly participated in User Requirements Canvasses which included onsite interviews, telephonic interviews and written surveys resulting in the identification of over 1,000 new requirements, including high-priority, specialized requirements in the Latent Services, Facial Recognition, and Multi-modal Biometrics areas. The NGI PO Staff hosted the IAFIS Interface Evaluation Task Force (IIETF) which reconvened at the CJIS Division on April 11 and 12, 2006 to continue the assessment of the NGI user requirements. At the conclusion of the meeting, the IIETF members collectively endorsed the priority and categorization of the NGI user requirements. Establishing user requirements will be essential to the successful design and development of NGI.

9. Did the Agency's Executive/Investment Committee approve this request? a. If "yes," what was the date of this approval? 10. Did the Project Manager review this Exhibit? 11. Contact information of Project Manager? Name
Young, Chris A

Yes 5/19/2006 Yes

Phone Number Email

304-625-2712 [email protected]

12. Has the agency developed and/or promoted cost effective, No energy efficient and environmentally sustainable techniques or practices for this project. a. Will this investment include electronic assets (including computers)?
Yes

b. Is this investment for new construction or major retrofit of No a Federal building or facility? (answer applicable to non-IT assets only) 1. If "yes," is an ESPC or UESC being used to help fund this investment? 2. If "yes," will this investment meet sustainable design principles? 3. If "yes," is it designed to be 30% more energy efficient than relevant code? 13. Does this investment support one of the PMA initiatives? If "yes," check all that apply: 13a. Briefly describe how this asset directly supports the identified initiative(s)?
Yes Expanded E-Government The NGI initiatives will allow the FBI to provide new services to state, local, and federal partners that supports the President's Management Agenda for electronic government. The FBI has worked with these partnering agencies through collaborative meetings such as the NGI workshop, Advisory Policy Board (APB) Working Group meetings, Compact Council, and the IAFIS Interface Evaluation Task Force (IIETF) meetings to identify new service requirements. No No

14. Does this investment support a program assessed using the Program Assessment Rating Tool (PART)? (For more information about the PART, visit www.whitehouse.gov/omb/part.) a. If "yes," does this investment address a weakness found during the PART review? b. If "yes," what is the name of the PART program assessed by OMB's Program Assessment Rating Tool? c. If "yes," what PART rating did it receive? 15. Is this investment for information technology?

Yes

No Criminal Justice Services Moderately Effective Yes

If the answer to Question: "Is this investment for information technology?" was "Yes," complete this sub-section. If the answer is "No," do not answer this sub-section. For information technology investments only: 16. What is the level of the IT Project? (per CIO Council PM Guidance) 17. What project management qualifications does the Project Manager have? (per CIO Council PM Guidance): 18. Is this investment identified as "high risk" on the Q4 - FY 2006 agency high risk report (per OMB's "high risk" memo)? 19. Is this a financial management system?
Level 2 (4) Project manager assigned but qualification status review has not yet started Yes No

a. If "yes," does this investment address a FFMIA compliance No area? 1. If "yes," which compliance area: 2. If "no," what does it address? b. If "yes," please identify the system name(s) and system acronym(s) as reported in the most recent financial systems inventory update required by Circular A-11 section 52 20. What is the percentage breakout for the total FY2008 funding request for the following? (This should total 100%) Hardware Software Services
78 5 17

Other 21. If this project produces information dissemination products for the public, are these products published to the Internet in conformance with OMB Memorandum 05-04 and included in your agency inventory, schedules and priorities? Name
Kelley, Patrick W

0 N/A

22. Contact information of individual responsible for privacy related questions:

Phone Number Title E-mail 23. Are the records produced by this investment appropriately scheduled with the National Archives and Records Administration's approval?

202-324-8067 Deputy General Counsel/Senior Privacy Official [email protected] Yes

I.B. Summary of Funding

Provide the total estimated life-cycle cost for this investment by completing the following table. All amounts represent budget authority in millions, and are rounded to three decimal places. Federal personnel costs should be included only in the row designated "Government FTE Cost," and should be excluded from the amounts shown for "Planning," "Full Acquisition," and "Operation/Maintenance." The total estimated annual cost of the investment is the sum of costs for "Planning," "Full Acquisition," and "Operation/Maintenance." For Federal buildings and facilities, life-cycle costs should include long term energy, environmental, decommissioning, and/or restoration costs. The costs associated with the entire life-cycle of the investment should be included in this report.
Table 1: SUMMARY OF SPENDING FOR PROJECT PHASES (REPORTED IN MILLIONS) (Estimates for BY+1 and beyond are for planning purposes only and do not represent budget decisions) PY - 1 and Earlier
Planning Budgetary Resources Acquisition 12.522 5.084 5 0

PY 2006

CY 2007

BY 2008

BY + 1 2009

BY + 2 2010

BY + 3 2011

BY + 4 and Beyond

Total

Budgetary Resources Subtotal Planning & Acquisition Budgetary Resources Operations & Maintenance Budgetary Resources TOTAL Budgetary Resources Government FTE Costs Budgetary Resources Number of FTE represented by Costs:

0 12.522 0 12.522 1.573 15

0 5.084 0 5.084 3.035 30

102.5 107.5 0 107.5 3.086 30

77.005 77.005 18.658 95.663 3.157 30

Note: For the cross-agency investments, this table should include all funding (both managing partner and partner agencies). Government FTE Costs should not be included as part of the TOTAL represented. 2. Will this project require the agency to hire additional FTE's? a. If "yes," How many and in what year?
Yes 11, FY2006

3. If the summary of spending has changed from the FY2007 President's budget request, briefly explain those changes:
The following changes have be made to the summary of spending chart from that submitted within the FY 2007 President's Request: - The government FTE costs for the planning, acquisition, O&M and Total all Stages categories are only reflected within the Government FTE Costs area per the revised guidance. Prior year data has been updated to reflect actual expenditures to date. - The FBI generated a government Life Cycle Cost Estimate (LCCE) for NGI in Fiscal Year (FY) 2004 that was used to support the formulation of the FY 2006 budget enhancement request and OMB 300 Exhibit for NGI.

I.C. Acquisition/Contract Strategy

1. Complete the table for all (including all non-Federal) contracts and/or task orders currently in place or planned for this investment. Total Value should include all option years for each contract. Contracts and/or task orders completed do not need to be included.
Contracts/Task Orders Table:

Contracts/Task Orders Table


2. If earned value is not required or will not be a contract requirement for any of the contracts or task orders above, explain why:

3. Do the contracts ensure Section 508 compliance? a. Explain why: 4. Is there an acquisition plan which has been approved in accordance with agency requirements? a. If "yes," what is the date? b. If "no," will an acquisition plan be developed? 1. If "no," briefly explain why:

Yes Legislative Compliance No 12/7/2004 Yes An acquisition plan has been developed for the following contracts: DJJ-05C1113-D4 - 02/15/2004, DJJ-05-C-1114-WPR25 - 02/21/2006, DJJ-05-C-1114WPR10 - 03/31/2005. A draft acquisition plan was developed for the future development contract on 06/29/2006. An acquisition plan that encompasses the entire program is not required in the LCMD until the program reaches Gate II. Prior to NGI reaching that milestone, an acquisition plan will be developed that includes the entire life cycle of the in

I.D. Performance Information

In order to successfully address this area of the exhibit 300, performance goals must be provided for the agency and be linked to the annual performance plan. The investment must discuss the agency's mission and strategic goals, and performance measures must be provided. These goals need to map to the gap in the agency's strategic goals and objectives this investment is designed to fill. They are the internal and external performance benefits this investment is expected to deliver to the agency (e.g., improve efficiency by 60 percent, increase citizen participation by 300 percent a year to achieve an overall citizen participation rate of 75 percent by FY 2xxx, etc.). The goals must be clearly measurable investment outcomes, and if applicable, investment outputs. They do not include the completion date of the module, milestones, or investment, or general goals, such as, significant, better, improved that do not have a quantitative or qualitative measure. Agencies must use Table 1 below for reporting performance goals and measures for all non-IT investments and for existing IT investments that were initiated prior to FY 2005. The table can be extended to include measures for years beyond FY 2006.
Performance Information Table 1: Fiscal Year Strategic Goal(s) Supported Performance Measure Actual/baseline (from Previous Year) Planned Performance Metric (Target) Performance Metric Results (Actual)

All new IT investments initiated for FY 2005 and beyond must use Table 2 and are required to use the Federal Enterprise Architecture (FEA) Performance Reference Model (PRM). Please use Table 2 and the PRM to identify the performance

information pertaining to this major IT investment. Map all Measurement Indicators to the corresponding "Measurement Area" and "Measurement Grouping" identified in the PRM. There should be at least one Measurement Indicator for at least four different Measurement Areas (for each fiscal year). The PRM is available at www.egov.gov.
Performance Information Table 2: Fiscal Measurement Year Area 2005 Customer Results Measurement Category Service Accessibility Measurement Grouping Access Measurement Indicator Record Retention Percentage Baseline 46% of criminal arrests retained in the IAFIS repository contain disposition information. Planned Improvement to the Baseline The number of criminal arrests that contain disposition information retained in the IAFIS repository will increase to 55% within one year of new capability. NGI response is generated to authorized agency within 24 hours. Actual Results NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in

2005

Customer Results

Service Accessibility

Access

Civil File Search Response

No capability for electronic civil file searches within IAFIS.

2005

Customer Results

Service Coverage

New Customers and Market Penetration

Flat Fingerprint acceptance rate

IAFIS currently accepts flat 100% of Agencies transmitting fingerprint impressions on a civil applicant fingerprint very limited basis. submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions. IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.

2005

Customer Results

Service Coverage

Service Efficiency

Ten-Print Transactions Processed Per day

2005

Customer Results

Service Coverage

Service Efficiency

Latent search capability

IAFIS daily latent search capability is 1052 transactions per day.

NGI will increase the IAFIS daily latent search capability to 1500 transactions per day

FY2010. 2005 Customer Results Timeliness and Responsiveness Response Time Criminal Ten Print Response Time IAFIS processes 95% of electronic criminal ten-print transactions within two hours. NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009 NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009.

2005

Customer Results

Timeliness and Responsiveness

Response Time

Civil Ten Print Response Time

IAFIS processes 99% of electronic civil ten-print transactions within 24 hours.

NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.

2005

Mission and Business Results

Homeland Security

Border and Transportation Security

Response Time for search of a known or suspected terrorist or wanted person

No IAFIS capability to provide a fast response to searches of a known or suspected terrorist and wanted person database.

Respond to 80% of all ETIS transactions within 10 seconds.

2005

Mission and Business Results

Law Enforcement

Crime Prevention

Accept and Store No IAFIS capability to rate for palm prints accept and store palm print submissions from local, state, and federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. No rap back functionality currently exists within IAFIS. Authorized participating agencies can not be electronically

Add capability to accept and store up to 10,000 palm print submissions per day from state, local, and federal law enforcement agencies

2005

Mission and Business Results

Law Enforcement

Crime Prevention

Enhancement is in planning and development phase to add capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.

2005

Mission and Business Results

Law Enforcement

Crime Prevention

Response Time for Rap Back Notification

NGI Rap back notifications will NGI is in the be provided within 24 hours of planning phase. arrest submission. Expected functionality is planned to be

notified when an enrolled employee has a subsequent arrest. 2005 Processes and Activities Productivity and Efficiency Efficiency Manual QC Process rate 50% of all ten-print submissions require a manual QC process. QC Automation will reduce the manual QC function to approximately 25% of all tenprint transactions

delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2007.

2005

Processes and Activities

Productivity and Efficiency Efficiency

Ten Print Transaction Reject Rate

Reject rate for FY 04 was approximately 5%. Inconsistent manual QC decisions result in a higher number of rejects.

QC Automation will reduce the NGI is in the ten-print transactions reject planning phase. rate to 4%. Expected functionality is planned to be delivered in FY2007. Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is

2005

Technology

Efficiency

Improvement

Accuracy Rate

The AFIS accuracy rate for ten print transactions is 95%

2005

Technology

Quality

Functionality

Photo Search Capability

Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos

2005

Technology

Quality

Functionality

Capacity Rate

The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new photos and these photos capabilities. can only be accepted when submitted with an arrest transaction. Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS Increase the number of photos submitted to 10 per arrest transaction and increase the number of photo sets per FBI

2005

Technology

Quality

Functionality

Increase Capacity per record

will retain up to ten photo sets per FBI record. 2005 Technology Reliability and Availability Availability System Availability IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%.

record to 25.

planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is

NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime.

2005

Technology

Reliability and Availability

Reliability

Search Penetration Rate

NGI will increase the IAFIS search penetration rate to 60%.

2006

Customer Results

Service Accessibility

Access

Record Retention Percentage

46% of criminal arrests retained in the IAFIS repository contain disposition information.

The number of criminal arrests that contain disposition information retained in the IAFIS repository will increase to 55% within one year of new capability. NGI response is generated to authorized agency within 24 hours.

2006

Customer Results

Service Accessibility

Access

Civil File Search Response

No capability for electronic civil file searches within IAFIS.

2006

Customer Results

Service Coverage

New Customers and Market Penetration

Flat Fingerprint Acceptance Rate

IAFIS currently accepts flat 100% of Agencies transmitting fingerprint impressions on a civil applicant fingerprint very limited basis. submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions. IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.

2006

Customer Results

Service Coverage

Service Efficiency

Ten Print Transactions per day

planned to be delivered in FY2010. 2006 Customer Results Service Coverage Service Efficiency Latent Search Capability IAFIS daily latent search capability is 1052 transactions per day. NGI will increase the IAFIS daily latent search capability to 1500 transactions per day. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is

2006

Customer Results

Timeliness and Responsiveness

Response Time

Criminal Ten Print Response Time

IAFIS processes 95% of electronic criminal ten-print transactions within two hours.

NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes.

2006

Customer Results

Timeliness and Responsiveness

Response Time

Civil Ten Print Response Time

IAFIS processes 99% of electronic civil ten-print transactions within 24 hours.

NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.

2006

Mission and Business Results

Homeland Security

Border and Transportation Security

Response Time for search of a known or suspected terrorist or wanted person

No IAFIS capability to provide a fast response to searches of a known or suspected terrorist and wanted person database.

Respond to 80% of all ETIS transactions within 10 seconds.

2006

Mission and Business Results

Law Enforcement

Crime Prevention

Accept and Store No IAFIS capability to rate for palm prints accept and store palm print submissions from local, state, and federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list

Add capability to accept and store up to 10,000 palm print submissions per day from state, local, and federal law enforcement agencies

2006

Mission and Business Results

Law Enforcement

Crime Prevention

Enhancement is in planning and development phase to add capability to search palm prints against a repository to

of candidates for latent palm print comparison to support criminal investigations. 2006 Mission and Business Results Law Enforcement Crime Prevention Response Time for Rap Back Notification

provide a list of candidates for planned to be latent palm print comparison delivered in to support criminal FY2009. investigations NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2007.

No rap back functionality NGI Rap back notifications will currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. 50% of all ten-print submissions require a manual QC process. QC Automation will reduce the manual QC function to approximately 25% of all tenprint transactions.

2006

Processes and Activities

Productivity and Efficiency Efficiency

Manual QC Process rate

2006

Processes and Activities

Productivity and Efficiency Efficiency

Ten Print Transaction Reject Rate

Reject rate for FY 04 was approximately 5%. Inconsistent manual QC decisions result in a higher number of rejects.

QC Automation will reduce the NGI is in the ten-print transactions reject planning phase. rate to 4%. Expected functionality is planned to be delivered in FY2007. Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase.

2006

Technology

Efficiency

Improvement

Accuracy Rate

The AFIS accuracy rate for ten print transactions is 95%

2006

Technology

Quality

Functionality

Photo Search Capability

Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos.

2006

Technology

Quality

Functionality

Capacity Rate

The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new

photos and these photos capabilities. can only be accepted when submitted with an arrest transaction. 2006 Technology Quality Functionality Increase Capacity per record Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS will retain up to ten photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. Increase the number of photos submitted to 10 per arrest transaction and increase the number of photo sets per FBI record to 25.

Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.

2006

Technology

Reliability and Availability

Availability

System Availability

NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime.

2006

Technology

Reliability and Availability

Reliability

Search Penetration Rate

NGI will increase the IAFIS search penetration rate to 60%.

2007

Customer Results

Service Accessibility

Access

Record Retention Percentage

46% of criminal arrests retained in the IAFIS repository contain disposition information.

The number of criminal arrests that contain disposition information retained in the IAFIS repository will increase to 55% within one year of new capability. NGI response is generated to authorized agency within 24 hours.

2007

Customer Results

Service Accessibility

Access

Civil File Search Response

No capability for electronic civil file searches within IAFIS.

2007

Customer Results

Service Coverage

New Customers and Market

Flat Fingerprint Acceptance Rate

IAFIS currently accepts flat 100% of Agencies transmitting NGI is in the fingerprint impressions on a civil applicant fingerprint planning phase.

Penetration

very limited basis.

submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions.

Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase.

2007

Customer Results

Service Coverage

Service Efficiency

Ten Print Transactions per day

IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.

2007

Customer Results

Service Coverage

Service Efficiency

Latent Search Capability

IAFIS daily latent search capability is 1052 transactions per day.

NGI will increase the IAFIS daily latent search capability to 1500 transactions per day.

2007

Customer Results

Timeliness and Responsiveness

Response Time

Criminal Ten Print Response Time

IAFIS processes 95% of electronic criminal ten-print transactions within two hours.

NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes.

2007

Customer Results

Timeliness and Responsiveness

Response Time

Civil Ten Print Response Time

IAFIS processes 99% of electronic civil ten-print transactions within 24 hours.

NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.

2007

Mission and Business Results

Homeland Security

Border and Transportation Security

Response Time for search of a known or suspected terrorist or wanted person

No IAFIS capability to provide a fast response to searches of a known or suspected terrorist and wanted person database.

Respond to 80% of all ETIS transactions within 10 seconds.

2007

Mission and Business

Law Enforcement

Crime Prevention

Accept and Store No IAFIS capability to Add capability to accept and rate for palm prints accept and store palm print store up to 10,000 palm print

Results

submissions from local, submissions per day from state, and federal law state, local, and federal law enforcement and criminal enforcement agencies. justice agencies nationwide. Law Enforcement Crime Prevention Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. Enhancement is in planning and development phase to add capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.

Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.

2007

Mission and Business Results

2007

Mission and Business Results

Law Enforcement

Crime Prevention

Response Time for Rap Back Notification

No rap back functionality NGI Rap back notifications will currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. 50% of all ten-print submissions require a manual QC process. Reject rate for FY 04 was approximately 5%. Inconsistent manual QC decisions result in a higher number of rejects. The AFIS accuracy rate for ten print transactions is 95%

2007

Processes and Activities

Productivity and Efficiency Efficiency

Manual QC Process rate

QC Automation will reduce the TBD manual QC function to approximately 25% of all tenprint transactions. QC Automation will reduce the TBD ten-print transactions reject rate to 4%.

2007

Processes and Activities

Productivity and Efficiency Efficiency

Ten Print Transaction Reject Rate

2007

Technology

Efficiency

Improvement

Accuracy Rate

Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible.

NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be

2007

Technology

Quality

Functionality

Photo Search Capability

Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos.

delivered in FY2009. 2007 Technology Quality Functionality Capacity Rate The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new photos and these photos capabilities. can only be accepted when submitted with an arrest transaction. Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS will retain up to ten photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. Increase the number of photos submitted to 10 per arrest transaction and increase the number of photo sets per FBI record to 25. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.

2007

Technology

Quality

Functionality

Increase Capacity per record

2007

Technology

Reliability and Availability

Availability

System Availability

NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime.

2007

Technology

Reliability and Availability

Reliability

Search Penetration Rate

NGI will increase the IAFIS search penetration rate to 60%.

2008

Customer Results

Service Accessibility

Access

Record Retention Percentage

46% of criminal arrests retained in the IAFIS repository contain disposition information.

The number of criminal arrests TBD that contain disposition information retained in the IAFIS repository will increase to 55% within one year of new capability. NGI response is generated to authorized agency within 24 hours. NGI is in the planning phase. Expected functionality is planned to be delivered in

2008

Customer Results

Service Accessibility

Access

Civil File Search Response

No capability for electronic civil file searches within IAFIS.

FY2010. 2008 Customer Results Service Coverage Frequency and Depth Latent Search Capability IAFIS daily latent search capability is 1052 transactions per day. NGI will increase the IAFIS daily latent search capability to 1500 transactions per day. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD

2008

Customer Results

Service Coverage

New Customers and Market Penetration

Flat Fingerprint Acceptance Rate

IAFIS currently accepts flat 100% of Agencies transmitting fingerprint impressions on a civil applicant fingerprint very limited basis. submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions. IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.

2008

Customer Results

Service Coverage

Service Efficiency

Ten Print Transactions per day

2008

Customer Results

Timeliness and Responsiveness

Response Time

Criminal Ten Print Response Time

IAFIS processes 95% of electronic criminal ten-print transactions within two hours.

NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes.

2008

Customer Results

Timeliness and Responsiveness

Response Time

Civil Ten Print Response Time

IAFIS processes 99% of electronic civil ten-print transactions within 24 hours.

NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.

2008

Mission and Business Results

Homeland Security

Border and Transportation Security

Response Time for search of a known or suspected terrorist or wanted person

No IAFIS capability to provide a fast response to searches of a known or suspected terrorist and wanted person database.

Respond to 80% of all ETIS transactions within 10 seconds.

2008

Mission and Business Results

Law Enforcement

Crime Prevention

Accept and Store No IAFIS capability to rate for palm prints accept and store palm print submissions from local, state, and federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.

Add capability to accept and store up to 10,000 palm print submissions per day from state, local, and federal law enforcement agencies.

NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD

2008

Mission and Business Results

Law Enforcement

Crime Prevention

Enhancement is in planning and development phase to add capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.

2008

Mission and Business Results

Law Enforcement

Crime Prevention

Response Time for Rap Back Notification

No rap back functionality NGI Rap back notifications will currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions.

2008

Processes and Activities

Productivity and Efficiency Efficiency

Manual QC Process rate

2008

Processes and Activities Technology

Productivity and Efficiency Efficiency Efficiency Improvement

Ten Print Transaction Reject Rate Accuracy Rate

Reject rate for is 4% due to Maintain reject rate of 4%. the automation of QC. The AFIS accuracy rate for ten print transactions is 95% Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible.

TBD

2008

NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be

2008

Technology

Quality

Functionality

Photo Search Capability

Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos.

delivered in FY2009. 2008 Technology Quality Functionality Capacity Rate The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new photos and these photos capabilities. can only be accepted when submitted with an arrest transaction. Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS will retain up to ten photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. Increase the number of photos submitted to 10 per arrest transaction and increase the number of photo sets per FBI record to 25. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.

2008

Technology

Quality

Functionality

Increase Capacity per record

2008

Technology

Reliability and Availability

Availability

System Availability

NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime.

2008

Technology

Reliability and Availability

Reliability

Search Penetration Rate

NGI will increase the IAFIS search penetration rate to 60%.

2009

Customer Results

Service Accessibility

Access

Record Retention Percentage

55% of criminal arrests retained in the IAFIS repository will contain disposition information. No capability for electronic civil file searches within IAFIS.

60% of criminal arrests will TBD contain disposition information within the IAFIS repository. NGI response is generated to authorized agency within 24 hours. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.

2009

Customer Results

Service Accessibility

Access

Civil File Search Response

2009

Customer Results

Service Coverage

New Customers and Market Penetration

Flat Fingerprint Acceptance Rate

IAFIS currently accepts flat 100% of Agencies transmitting TBD fingerprint impressions on a civil applicant fingerprint very limited basis. submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions. IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD

2009

Customer Results

Service Coverage

Service Efficiency

Latent Search Capability

2009

Customer Results

Service Coverage

Service Efficiency

Civil File Search Response

IAFIS daily latent search capability is 1052 transactions per day.

NGI will increase the IAFIS daily latent search capability to 1500 transactions per day.

2009

Customer Results

Timeliness and Responsiveness

Response Time

Criminal Ten Print Response Time

IAFIS processes 95% of electronic criminal ten-print transactions within two hours.

NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes.

2009

Customer Results

Timeliness and Responsiveness

Response Time

Civil Ten Print Response Time

IAFIS processes 99% of electronic civil ten-print transactions within 24 hours.

NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.

2009

Mission and Business Results

Homeland Security

Border and Transportation Security

Response Time for search of a known or suspected terrorist or wanted person

Respond to 80% of all ETIS Maintain 80% of all ETIS transactions within 10 transactions to complete seconds. within 10 seconds.

2009

Mission and Business

Law Enforcement

Crime Prevention

Accept and Store No IAFIS capability to Add capability to accept and rate for palm prints accept and store palm print store up to 10,000 palm print

TBD

Results

submissions from local, submissions per day from state, and federal law state, local, and federal law enforcement and criminal enforcement agencies. justice agencies nationwide. Law Enforcement Crime Prevention Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. Enhancement is in planning TBD and development phase to add capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD

2009

Mission and Business Results

2009

Mission and Business Results

Law Enforcement

Crime Prevention

Response Time for Rap Back Notification

No rap back functionality NGI Rap back notifications will currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions.

2009

Processes and Activities

Productivity and Efficiency Efficiency

Manual QC Process rate

2009

Processes and Activities Technology

Productivity and Efficiency Efficiency Efficiency Improvement

Ten Print Transaction Reject Rate Accuracy Rate

Reject rate for is 4% due to Maintain reject rate of 4%. the automation of QC. The AFIS accuracy rate for ten print transactions is 95% Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible.

TBD

2009

NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD

2009

Technology

Quality

Functionality

Photo Search Capability Increase Capacity

Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos. The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new photos and these photos capabilities. can only be accepted when

2009

Technology

Quality

Functionality

TBD

submitted with an arrest transaction. 2009 Technology Quality Functionality Increase Capacity per record Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS will retain up to ten photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. Increase the number of photos TBD submitted to 10 per arrest transaction and increase the number of photo sets per FBI record to 25. NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.

2009

Technology

Reliability and Availability

Availability

System Availability

2009

Technology

Reliability and Availability

Reliability

Search Penetration Rate

NGI will increase the IAFIS search penetration rate to 60%.

2010

Customer Results

Service Accessibility

Access

Record Retention Percentage

55% of criminal arrests retained in the IAFIS repository will contain disposition information. No capability for electronic civil file searches within IAFIS. 100% of Agencies transmitting civil applicant fingerprint submissions will have the capability to submit ten-flat fingerprint impressions instead of tenrolled fingerprint impressions.

60% of criminal arrests will TBD contain disposition information within the IAFIS repository. NGI response is generated to authorized agency within 24 hours. TBD

2010

Customer Results Customer Results

Service Accessibility Service Coverage

Access

Civil File Search Response Flat Fingerprint Acceptance Rate

2010

New Customers and Market Penetration

Maintain the ability for 100% TBD of Agencies transmitting civil applicant fingerprint submissions to have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions.

2010

Customer Results

Service Coverage

Service Efficiency

Latent Search Capability

IAFIS is currently capable NGI will allow IAFIS to process TBD of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.

2010

Customer Results Customer Results

Service Coverage Timeliness and Responsiveness

Service Efficiency Response Time

Civil File Search Response Criminal Ten Print Response Time

IAFIS daily latent search capability is 1052 transactions per day. IAFIS processes 95% of electronic criminal ten-print transactions within two hours. IAFIS processes 99% of electronic civil ten-print transactions within 24 hours.

NGI will increase the IAFIS daily latent search capability to 1500 transactions per day.

TBD

2010

NGI will allow IAFIS to process TBD 95% of electronic criminal tenprint transactions within 15 minutes. NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours. TBD

2010

Customer Results

Timeliness and Responsiveness

Response Time

Civil Ten Print Response Time

2010

Mission and Business Results

Homeland Security

Border and Transportation Security

Response Time for search of a known or suspected terrorist or wanted person

Respond to 80% of all ETIS Maintain 80% of all ETIS transactions within 10 transactions to complete seconds within 10 seconds.

TBD

2010

Mission and Business Results

Law Enforcement

Crime Prevention

Accept and Store Capability to accept and rate for palm prints store up to 10,000 palm print submissions per day from state, local, and federal law enforcement agencies. Palm Print Search Capability Capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.

Increase the number of palm print submissions accepted and stored by 10%.

TBD

2010

Mission and Business Results

Law Enforcement

Crime Prevention

Maintain capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.

TBD

2010

Mission and Business Results

Law Enforcement

Crime Prevention

Response Time for Rap Back Notification

No rap back functionality NGI Rap back notifications will TBD currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions. TBD

2010

Processes and Activities

Productivity and Efficiency Efficiency

Manual QC Process rate

2010

Processes and

Productivity and Efficiency

Ten Print

Reject rate for is 4% due to Maintain reject rate of 4%.

TBD

Activities 2010 Technology

Efficiency Efficiency Improvement

Transaction Reject Rate Accuracy Rate

the automation of QC. The AFIS accuracy rate for ten print transactions is 95% Capability to search capability for facial, scar, mark, and tattoo photos. Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. Maintain search capability for facial, scar, mark, and tattoo photos. TBD

2010

Technology

Quality

Functionality

Photo Search Capability Increase Capacity

TBD

2010

Technology

Quality

Functionality

The Interstate Photo Increase the number of IPS System will contain at least photos by 10%. 1,541,421 photos. IAFIS will accept 10 photos per arrest transaction and maintain 25 photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. 60% of criminal arrests retained in the IAFIS repository will contain disposition information. IAFIS civil response generation to authorized agencies within 24 hours. 100% of Agencies transmitting civil applicant fingerprint submissions will have the capability to submit ten-flat fingerprint impressions instead of tenrolled fingerprint impressions.

TBD

2010

Technology

Quality

Functionality

Increase Capacity per record

Continue to accept 10 photos TBD per arrest transaction and maintain 25 photo sets per FBI record. NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime. TBD

2010

Technology

Reliability and Availability

Availability

System Availability

2010

Technology

Reliability and Availability Service Accessibility

Reliability

Search Penetration Rate Record Retention Percentage

NGI will increase the IAFIS search penetration rate to 60%.

TBD

2011

Customer Results

Access

65% of criminal arrests will TBD contain disposition information within in the IAFIS repository. Maintain IAFIS civil response generation to authorized agencies within 24 hours. TBD

2011

Customer Results Customer Results

Service Accessibility Service Coverage

Access

Civil File Search Response Flat Fingerprint Acceptance Rate

2011

New Customers and Market Penetration

Maintain the ability for 100% TBD of Agencies transmitting civil applicant fingerprint submissions to have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions.

2011

Customer Results

Service Coverage

Service Efficiency

Latent Search Capability

IAFIS will be capable of processing 200,000 tenprint transactions per day with increased scalability. IAFIS daily latent search capability will be 1500 transactions per day. IAFIS will process 95% of electronic criminal ten-print transactions within 15 minutes. IAFIS will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.

Maintain ability for IAFIS to process 200,000 ten-print transactions per day with increased scalability.

TBD

2011

Customer Results

Service Coverage

Service Efficiency

Civil File Search Response

Maintain IAFIS daily latent TBD search capability at a minimum of 1500 transactions per day. Maintain ability for IAFIS to TBD process 95% of electronic criminal ten-print transactions within 15 minutes. Maintain IAFIS capability of processing 99% of electronic civil ten-print transactions within 8 hours. TBD

2011

Customer Results

Timeliness and Responsiveness

Response Time

Criminal Ten Print Response Time

2011

Customer Results

Timeliness and Responsiveness

Response Time

Civil Ten Print Response Time

2011

Mission and Business Results

Homeland Security

Border and Transportation Security

Response Time for search of a known or suspected terrorist or wanted person

Respond to 80% of all ETIS Maintain 80% of all ETIS transactions within 10 transactions to complete seconds. within 10 seconds.

TBD

2011

Mission and Business Results

Law Enforcement

Crime Prevention

Accept and Store Accept and store 11,000 Increase the number of palm rate for palm prints palm print submissions per print submissions accepted day from local, state, and and stored by 10%. federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability Capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. Maintain capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.

TBD

2011

Mission and Business Results

Law Enforcement

Crime Prevention

TBD

2011

Mission and Business Results Processes and Activities

Law Enforcement

Crime Prevention

Response Time for Rap Back Notification Manual QC Process rate

IAFIS will provide Rap back Maintain IAFIS ability to TBD notifications within 24 provide Rap back notifications hours of arrest submission. within 24 hours of arrest submission. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions. TBD

2011

Productivity and Efficiency Efficiency

2011

Processes and Activities Technology

Productivity and Efficiency Efficiency Efficiency Improvement

Ten Print Transaction Reject Rate Accuracy Rate

Reject rate for is 4% due to Maintain reject rate of 4%. the automation of QC. The AFIS accuracy rate for ten print transactions will be as close to 100% as technically feasible. Capability to search capability for facial, scar, mark, and tattoo photos. Maintain the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. Maintain search capability for facial, scar, mark, and tattoo photos.

TBD

2011

TBD

2011

Technology

Quality

Functionality

Photo Search Capability Increase Capacity

TBD

2011

Technology

Quality

Functionality

The Interstate Photo Increase the number of IPS System will contain at least photos by 10%. 1,695,563 photos. IAFIS will accept 10 photos per arrest transaction and maintain 25 photo sets per FBI record. IAFIS will be available 24 hours a day, 7 days a week, with 0 system outages for maintenance or upgrades. The IAFIS search penetration rate will be 60%. 65% of criminal arrests retained in the IAFIS repository will contain disposition information. IAFIS civil response generation to authorized agencies within 24 hours. 100% of Agencies transmitting civil applicant fingerprint submissions will have the capability to submit ten-flat fingerprint impressions instead of tenrolled fingerprint impressions.

TBD

2011

Technology

Quality

Functionality

Increase Capacity per record

Continue to accept 10 photos TBD per arrest transaction and maintain 25 photo sets per FBI record. Maintain IAFIS availability 24 hours a day, 7 days a week, with 0 system outages for maintenance or upgrades. Maintain IAFIS search penetration rate at 60%. Maintain at least 65% of criminal arrests with disposition information within in the IAFIS repository. Maintain IAFIS civil response generation to authorized agencies within 24 hours. TBD

2011

Technology

Reliability and Availability

Availability

System Availability

2011

Technology

Reliability and Availability Service Accessibility

Reliability

Search Penetration Rate Record Retention Percentage

TBD

2012

Customer Results

Access

TBD

2012

Customer Results Customer Results

Service Accessibility Service Coverage

Access

Civil File Search Response Flat Fingerprint Acceptance Rate

TBD

2012

New Customers and Market Penetration

Maintain the ability for 100% TBD of Agencies transmitting civil applicant fingerprint submissions to have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions.

2012

Customer Results

Service Coverage

Service Efficiency

Latent Search Capability

IAFIS will be capable of processing 200,000 tenprint transactions per day with increased scalability. IAFIS daily latent search capability will be 1500 transactions per day. IAFIS will process 95% of electronic criminal ten-print transactions within 15 minutes. IAFIS will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.

Maintain ability for IAFIS to process 200,000 ten-print transactions per day with increased scalability.

TBD

2012

Customer Results

Service Coverage

Service Efficiency

Civil File Search Response

Maintain IAFIS daily latent TBD search capability at a minimum of 1500 transactions per day. Maintain ability for IAFIS to TBD process 95% of electronic criminal ten-print transactions within 15 minutes. Maintain IAFIS capability of processing 99% of electronic civil ten-print transactions within 8 hours. TBD

2012

Customer Results

Timeliness and Responsiveness

Response Time

Criminal Ten Print Response Time

2012

Customer Results

Timeliness and Responsiveness

Response Time

Civil Ten Print Response Time

2012

Mission and Business Results

Homeland Security

Border and Transportation Security

Response Time for search of a known or suspected terrorist or wanted person

Respond to 80% of all ETIS Maintain 80% of all ETIS transactions within 10 transactions to complete seconds. within 10 seconds.

TBD

2012

Mission and Business Results

Law Enforcement

Crime Prevention

Accept and Store Accept and store 12,100 Increase the number of palm rate for palm prints palm print submissions per print submissions accepted day from local, state, and and stored by 10%. federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability Capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. Maintain capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.

TBD

2012

Mission and Business Results

Law Enforcement

Crime Prevention

TBD

2012

Mission and Business Results Processes and Activities

Law Enforcement

Crime Prevention

Response Time for Rap Back Notification Manual QC Process rate

IAFIS will provide Rap back Maintain IAFIS ability to TBD notifications within 24 provide Rap back notifications hours of arrest submission. within 24 hours of arrest submission. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions. TBD

2012

Productivity and Efficiency Efficiency

2012

Processes and Activities Technology

Productivity and Efficiency Efficiency Efficiency Improvement

Ten Print Transaction Reject Rate Accuracy Rate

Reject rate for is 4% due to Maintain reject rate of 4%. the automation of QC. The AFIS accuracy rate for ten print transactions will be as close to 100% as technically feasible. Capability to search capability for facial, scar, mark, and tattoo photos. Maintain the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. Maintain search capability for facial, scar, mark, and tattoo photos.

TBD

2012

TBD

2012

Technology

Quality

Functionality

Photo Search Capability Increase Capacity

TBD

2012

Technology

Quality

Functionality

The Interstate Photo Increase the number of IPS System will contain at least photos by 10%. 1,865,119 photos. IAFIS will accept 10 photos per arrest transaction and maintain 25 photo sets per FBI record. IAFIS will be available 24 hours a day, 7 days a week, with 0 system outages for maintenance or upgrades. The IAFIS search penetration rate will be 60%.

TBD

2012

Technology

Quality

Functionality

Increase Capacity per record

Continue to accept 10 photos TBD per arrest transaction and maintain 25 photo sets per FBI record. Maintain IAFIS availability 24 hours a day, 7 days a week, with 0 system outages for maintenance or upgrades. Maintain IAFIS search penetration rate at 60%. TBD

2012

Technology

Reliability and Availability

Availability

System Availability

2012

Technology

Reliability and Availability

Reliability

Search Penetration Rate

TBD

I.E. Security and Privacy

In order to successfully address this area of the business case, each question below must be answered at the system/application level, not at a program or agency level. Systems supporting this investment on the planning and operational systems security tables should match the systems on the privacy table below. Systems on the Operational Security Table must be included on your agency FISMA system inventory and should be easily referenced in the inventory (i.e., should use the same name or identifier). All systems supporting and/or part of this investment should be included in the tables below, inclusive of both agency owned systems and contractor systems. For IT investments under development, security and privacy planning must proceed in parallel with the development of the system/s to ensure IT security and privacy requirements and costs are identified and

incorporated into the overall lifecycle of the system/s. Please respond to the questions below and verify the system owner took the following actions: 1. Have the IT security costs for the system(s) been identified and integrated into the overall costs of the investment: a. If "yes," provide the "Percentage IT Security" for the budget year: 2. Is identifying and assessing security and privacy risks a part of the overall risk management effort for each system supporting or part of this investment.
3. Systems in Planning - Security Table:
Name of System Agency/ or Contractor Operated System? Planned Operational Date Planned or Actual C&A Completion Date

Yes 4.30 Yes

Advanced Fingerprint Identification Technology (AFIT) Government Only Disposition Reporting Improvements Enhanced IAFIS Repository Enhanced Terrorist Identification Service (ETIS) Interstate Photo System (IPS) Enhancements National Palm Print System Quality Check Automation Government Only Government Only Government Only Government Only Government Only Government Only

9/30/2010 9/30/2008 9/30/2010 9/30/2008 9/30/2009 9/30/2009 9/28/2007

8/31/2010 8/31/2008 8/31/2010 8/31/2008 8/31/2009 8/31/2009 8/31/2007

4. Operational Systems - Security Table:


Name of System Agency/ or Contractor Operated System? NIST FIPS 199 Risk Impact level Has C&A been Completed, using NIST 800-37? Date C&A Complete What standards were used Date Complete(d): for the Security Controls Security Control Testing tests? Date the contingency plan tested

IAFIS

Contractor and Government

Yes

5/16/2006

FIPS 200 / NIST 800-53

2/17/2006

4/20/2006

5. Have any weaknesses related to any of the systems part of or supporting this investment been identified by the agency or IG? a. If "yes," have those weaknesses been incorporated agency's plan of action and milestone process? 6. Indicate whether an increase in IT security funding is requested to remediate IT security weaknesses? a. If "yes," specify the amount, provide a general description of the weakness, and explain how the funding request will remediate the weakness.

7. How are contractor security procedures monitored, verified, validated by the agency for the contractor systems above?
FBI personnel operate the system in conjunction with support contractors that are on-site at the CJIS Division facility. The contractors receive an annual security awareness briefing in conjunction with the FBI briefings. All security incidents are reported to the CJIS Chief Security Officer. The COTR is responsible for assuring the security requirements and procedures identified in the contract are adhered to by the contractors, through site visits and performance reviews. The COTR is supported in this endeavor by the ISSM, ISSO and other CJIS Contract Administration Office staff members who review all contract modifications. Security-specific requirements are included as part of the Statements of Work to ensure contractors are aware of their responsibilities. Additionally, for those contractors who work at an off-site location, an In-Plant Security Plan is required. This Plan is verified by FBI personnel prior to the contractors beginning work on an FBI project. Site visits are also performed on an annual basis to ensure the security requirements remain in effect. 8. Planning & Operational Systems - Privacy Table:
Name of System Is this a new system? Is there a Privacy Impact Assessment (PIA) that covers this system? Is the PIA available to the public? Is a System of Records Notice (SORN) required for this system? Was a new or amended SORN published in FY 06?

IAFIS (NGI)

No

Yes.

Yes.

Yes

No, because the existing Privacy Act system of records was not substantially revised in FY 06.

I.F. Enterprise Architecture (EA)

In order to successfully address this area of the business case and capital asset plan you must ensure the investment is included in the agency's EA and Capital Planning and Investment Control (CPIC) process, and is mapped to and supports the FEA. You must also ensure the business case demonstrates the relationship between the investment and the business, performance, data, services, application, and technology layers of the agency's EA. 1. Is this investment included in your agency's target enterprise architecture? a. If "no," please explain why? 2. Is this investment included in the agency's EA Transition Strategy? a. If "yes," provide the investment name as identified in the Transition Strategy provided in the agency's most recent annual EA Assessment. b. If "no," please explain why?
Yes Next Generation IAFIS Yes

3. Service Reference Model (SRM) Table: Identify the service components funded by this major IT investment (e.g., knowledge management, content management, customer relationship management, etc.). Provide this information in the format of the following table. For detailed guidance regarding components, please refer to http://www.whitehouse.gov/omb/egov/. Agency Component Name Agency Component Description Service Domain Back Office Services Back Office Services Business Analytical Services Customer Services Customer Services Digital Asset Services Digital Asset Services Digital Asset Services Digital Asset Services Digital Asset Services FEA SRM Service Type Data Management Data Management Analysis and Statistics Customer Preferences Customer Relationship Management Document Management Document Management Knowledge Management Knowledge Management Knowledge Management FEA SRM Component Extraction and Transformation Loading and Archiving Forensics Alerts and Notifications Customer Feedback Indexing Library / Storage Information Retrieval Knowledge Capture Knowledge Distribution and Delivery FEA Service Component Reused Name FEA Service Component Reused UPI Internal or External Reuse? No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse 5 5 20 10 5 5 5 5 20 20 BY Funding Percentage

Use existing SRM Components or identify as "NEW". A "NEW" component is one not already identified as a service component in the FEA SRM. A reused component is one being funded by another investment, but being used by this investment. Rather than answer yes or no, identify the reused service component funded by the other investment and identify the other investment using the Unique

Project Identifier (UPI) code from the OMB Ex 300 or Ex 53 submission. 'Internal' reuse is within an agency. For example, one agency within a department is reusing a service component provided by another agency within the same department. 'External' reuse is one agency within a department reusing a service component provided by another agency in another department. A good example of this is an E-Gov initiative service being reused by multiple organizations across the federal government. Please provide the percentage of the BY requested funding amount used for each service component listed in the table. If external, provide the funding level transferred to another agency to pay for the service.
4. Technical Reference Model (TRM) Table: To demonstrate how this major IT investment aligns with the FEA Technical Reference Model (TRM), please list the Service Areas, Categories, Standards, and Service Specifications supporting this IT investment. FEA SRM Component Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and Delivery FEA TRM Service Area Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework FEA TRM Service Category Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic FEA TRM Service Standard Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Independent Platform Independent Platform Independent Platform Independent Platform Independent Platform Independent Platform Independent Service Specification (i.e. vendor or product name)

Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and

Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework

Business Logic Business Logic Business Logic Data Management Data Management Data Management Data Management Data Management Data Management Data Management Data Management Data Management Data Management Security Security Security Security Security Security Security Security Security Security

Platform Independent Platform Independent Platform Independent Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Web Browser Web Browser Web Browser Web Browser Web Browser Web Browser Web Browser

Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels

Delivery Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Indexing Library / Storage Customer Feedback Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Indexing Library / Storage Customer Feedback Alerts and Notifications Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Interface and Integration Integration Integration Integration Web Browser Web Browser Web Browser Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Middleware Middleware Middleware Middleware

Integration Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Indexing Library / Storage Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Indexing Library / Storage Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Integration Integration Integration Integration Integration Integration Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Middleware Middleware Middleware Middleware Middleware Middleware Database Database Database Database Database Database Database Database Database Database Storage Storage Storage

Infrastructure Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Indexing Library / Storage Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Indexing Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Hardware / Infrastructure Hardware / Storage Storage Storage Storage Storage Storage Storage Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Embedded Technology Devices Embedded Technology

Infrastructure Library / Storage Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and

Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware /

Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Network Devices / Standards

Infrastructure Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and

Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals

Transformation Customer Feedback Alerts and Notifications Library / Storage Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and

Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and

Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration

Transformation Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Alerts and Notifications Library / Storage Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and

Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms

Management Test Management Test Management Test Management Test Management Test Management Test Management Test Management Test Management Test Management Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent

Transformation

Infrastructure

Service Components identified in the previous question should be entered in this column. Please enter multiple rows for FEA SRM Components supported by multiple TRM Service Specifications In the Service Specification field, Agencies should provide information on the specified technical standard or vendor product mapped to the FEA TRM Service Standard, including model or version numbers, as appropriate. 5. Will the application leverage existing components and/or applications across the Government (i.e., FirstGov, Pay.Gov, etc)? a. If "yes," please describe. 6. Does this investment provide the public with access to a government automated information system? a. If "yes," does customer access require specific software (e.g., a specific web browser version)? 1. If "yes," provide the specific product name(s) and version number(s) of the required software and the date when the public will be able to access this investment by any software (i.e. to ensure equitable and timely access of government information and services).
No No

Exhibit 300: Part II: Planning, Acquisition and Performance Information


II.A. Alternatives Analysis

Part II should be completed only for investments identified as "Planning" or "Full Acquisition," or "Mixed Life-Cycle" investments in response to Question 6 in Part I, Section A above. In selecting the best capital asset, you should identify and consider at least three viable alternatives, in addition to the current baseline, i.e., the status quo. Use OMB Circular A- 94 for all investments, and the Clinger Cohen Act of 1996 for IT investments, to determine the criteria you should use in your Benefit/Cost Analysis.

1. Did you conduct an alternatives analysis for this project? a. If "yes," provide the date the analysis was completed? b. If "no," what is the anticipated date this analysis will be completed? c. If no analysis is planned, please briefly explain why:

Yes 4/1/2005

2. Alternative Analysis Results: Use the results of your alternatives analysis to complete the following table: Send to OMB Alternative Analyzed Description of Alternative Risk Adjusted Lifecycle Costs Risk Adjusted Lifecycle Benefits estimate estimate

True

System Evolution using COTS Products (Previous submission did not account for O&M costs in FY 2011 & FY 2010)

418.944

96.501

3. Which alternative was selected by the Agency's Executive/Investment Committee and why was it chosen?
The NGI will most likely be developed using alternative 3, COTS products. This is a viable alternative due to the timeliness of the implementation, availability of the COTS products, the advantages related to interoperability and information sharing, and the technical support available through the vendor. However, the upcoming detailed NGI studies will determine the chosen NGI alternative.

4. What specific qualitative benefits will be realized?


Advanced Fingerprint Identification Technology (AFIT) Benefits: Interoperability with other systems; more efficient searches; accommodates increased volumes in pre-employment background checks; ensures fewer misses in fingerprint accuracy; avoids hiring additional staff to accommodate increased workload volumes. Enhanced Terrorist Identification Service (ETIS) Benefits: Supports Terrorist Screening Center; provides for latent fingerprint searches; allows for connectivity with local law enforcement through National Crime Information Center (NCIC). Quality Check Function Benefits: Verifies authorized users; establishes consistency for data verification and better management of user fee transactions; streamlines work processes, improves overall response time; reduces number of ten-print transactions rejected by IAFIS, saving costs to local law enforcement; allows more timely updates of records; avoids hiring additional staff to accommodate increased workload volumes. Disposition Reporting Improvements (DRI) Benefits: These enhancements will facilitate a more complete CHRI that will support local, state, and federal criminal justice agencies. A more complete CHRI will also benefit the adjudication of civil applicant background checks. Enhanced IAFIS Repository Benefits: Will notify responsible agency regarding criminal activity of individuals in sensitive positions; automatically allows for transition of files between civil and criminal repositories; supports flat fingerprints; supports national security; increases repository capacity; creates new functionality for the civil file; provides the ability to search the civil records with remote latent fingerprint submissions; will provide expanded/new search and response generation capabilities; collectively locate civil history and CHRI to facilitate the search, addition, consolidation,

modification, expungement, response generation, and file maintenance of civil and criminal information. Interstate Photo System (IPS) Enhancements Benefits: Easier submission and retrieval of photos into database; increased number of photos retained; new search capabilities will help to solve crimes; ability to collect and retain data to field facial identification services in a future multi-modal system. FBI National Palm Print System (NPPS) Benefits: Will allow for identification of more prints (estimates are that 30 percent of latent lifts are made from palm prints); provides an additional tool to solve more

II.B. Risk Management

You should have performed a risk assessment during the early planning and initial concept phase of this investment's lifecycle, developed a risk-adjusted life-cycle cost estimate and a plan to eliminate, mitigate or manage risk, and be actively managing risk throughout the investment's life-cycle. 1. Does the investment have a Risk Management Plan? a. If "yes," what is the date of the plan? b. Has the Risk Management Plan been significantly changed since last year's submission to OMB? c. If "yes," describe any significant changes: 2. If there currently is no plan, will a plan be developed? a. If "yes," what is the planned completion date? b. If "no," what is the strategy for managing the risks? 3. Briefly describe how investment risks are reflected in the life cycle cost estimate and investment schedule:
The lifecycle costs estimates and investment schedule will be updated based on the detailed functionality and cost benefit analysis that will be defined by the requirements study contractor (IntelliDyne, LLC). The NGI PO has set aside an 18 percent management reserve out of the $42,742,000 that was received in Fiscal Year 2005 from the Working Capital Fund to be utilized to address any risk mitigation costs. It is anticipated that as the Project matures, the management reserve will decrease to approximately 10 percent of the annual funding that is received for the project. In addition, the FBI NGI Risk Register will identify the potential costs associated with mitigation strategies with a risk exposure of six or higher. The NGI PO is planning slack within the schedule to account for risks that will affect the delivery of initiatives Yes 11/15/2005 No

II.C. Cost and Schedule Performance

1. Does the earned value management system meet the

Yes

criteria in ANSI/EIA Standard-748? 2. Answer the following questions about current cumulative cost and schedule performance. The numbers reported below should reflect current actual information. (Per OMB requirements Cost/Schedule Performance information should include both Government and Contractor Costs): a. What is the Planned Value (PV)? b. What is the Earned Value (EV)? c. What is the actual cost of work performed (AC)? d. What costs are included in the reported Cost/Schedule Performance information (Government Only/Contractor Only/Both)? e. "As of" date: 3. What is the calculated Schedule Performance Index (SPI= EV/PV)? 4. What is the schedule variance (SV = EV-PV)? 5. What is the calculated Cost Performance Index (CPI = EV/AC)? 6. What is the cost variance (CV=EV-AC)?
9.51 9.51 8.3990 Contractor and Government

6/9/2006 1 0 1.13 1.1110

7. Is the CV% or SV% greater than +/- 10%? (CV%= CV/EV x Yes 100; SV%= SV/PV x 100) a. If "yes," was it the? b. If "yes," explain the variance:
The Requirements Study Contract is currently under budget (CPI of 1.11 & CV% of 9.7%) CV

c. If "yes," what corrective actions are being taken?


None

d. What is most current "Estimate at Completion"? 8. Have any significant changes been made to the baseline during the past fiscal year? 8. If "yes," when was it approved by OMB?
No No

Comparison of Initial Baseline and Current Approved Baseline


Initial Baseline Planned Completion Date
09/30/2005 09/30/2005 09/30/2005 09/29/2006 09/29/2006 09/29/2006 09/28/2007 09/28/2007 09/28/2007 09/30/2008 09/30/2008 09/30/2008 09/30/2009 09/30/2009 09/30/2009 09/30/2010 09/30/2010 09/30/2010 09/30/2011 09/30/2011 09/30/2011 09/28/2012 09/28/2012 09/28/2012 09/30/2005 09/30/2005 12/19/2005 09/30/2005 09/30/2005

Milestone Number

Description of Milestone

Current Baseline Completion Date Planned


09/30/2005 09/30/2005 09/30/2005 09/29/2006 09/29/2006 09/29/2006 09/28/2007 09/28/2007 09/28/2007 09/30/2008 09/30/2008 09/30/2008 09/30/2009 09/30/2009 09/30/2009 09/30/2010 09/30/2010 09/30/2010 09/30/2011 09/30/2011 09/30/2011 09/28/2012 09/28/2012 09/28/2012 09/30/2005 09/30/2005 12/19/2005 09/30/2005 09/30/2005 09/30/2005 09/30/2005 12/19/2005 09/30/2005 09/30/2005

Current Baseline Variance Schedule (# days) Cost


0 $0.000 0 $0.000 0 $0.000 $0.000 $0.000 $0.000

Total Cost (Estimated)


$0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.467 $0.172 $0.000 $0.034 $0.000

Total Cost Planned Actual


$0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.467 $0.172 $0.000 $0.034 $0.000 $0.200 $0.172 $0.000 $0.034 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000

Percent Complete

Actual
09/30/2005 09/30/2005 09/30/2005

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 1.1 1.2 1.3 2.1 2.2

Planning - FY05 Acquisition - FY05 O&M FY05 Planning - FY06 Acquisition - FY06 O&M - FY06 Planning - FY07 Acquisition - FY08 O&M - FY07 Planning - FY08 Acquisition - FY08 O&M - FY08 Planning Acquisition - FY09 O&M - FY09 Planning - FY10 Acquisition - FY10 O&M - FY10 Planning - FY11 Acquisition - FY11 O&M - FY11 Planning - FY12 Acquisition- FY12 O&M - FY12 NGI PM Support Internal Requirements Contract Award Hardware Software

100% 100% 100% 67% 100% 100% % % % % % % % % % % % % % % % % % %

0 $0.267 0 $0.000 0 $0.000 0 $0.000 0 $0.000

100% 100% 0% 100% 100%

2.3 3.1 3.2 3.3 4.1 4.2 5.1 5.2 5.3 6.1 6.2 6.3 7.1 7.2 7.3 7.4 7.6 7.7 8.1 8.2 8.4 8.5 9.1 9.2 9.3 9.4 9.5 10.1 10.2 10.3 11.1 11.2 11.3 11.4 12.1

Services Hardware Software Services NGI PM Support Internal Requirements Hardware Software Travel Hardware Software Services NGI PM Support Internal Requirrements Contract Award Travel IT Security, CM, QA Support Training Hardware Software Training Travel Hardware Software Services Training Travel Hardware Software Services Hardware Software Training Travel Hardware

09/30/2005 09/30/2005 09/30/2005 09/30/2005 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008

$0.000 $0.000 $0.000 $0.000 $1.401 $2.376 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $2.054 $2.372 $0.000 $0.480 $0.648 $0.100 $66.603 $36.808 $0.170 $0.399 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $56.945 $19.789 $0.073 $0.198 $17.696

09/30/2005 09/30/2005 09/30/2005 09/30/2005 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008

09/30/2005 09/30/2005 09/30/2005 09/30/2005

$0.000 $0.000 $0.000 $0.000 $1.401 $2.376 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $2.054 $2.372 $0.000 $0.480 $0.648 $0.100 $66.603 $36.808 $0.170 $0.399 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $56.945 $19.789 $0.073 $0.198 $17.696

$0.000 $0.000 $0.000 $0.000 $0.975 $1.586 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000

0 $0.000 0 $0.000 0 $0.000 0 $0.000 $0.426 $0.790 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000

100% 100% 100% 100% 67% 67% 100% 100% 100% 100% 100% 100% % % % % % % % % % % % % % % % % % % % % % % %

12.2 12.3 12.4 12.5 13.1 13.2 13.3 14.1 14.2 14.3 14.4 15.1 15.2 15.3 15.4 15.5 16.1 16.2 16.3 17.1 17.2 17.3 17.4 18.1 18.2 18.3 18.4 18.5 19.1 19.2 19.3 20.1 20.2 20.3 21.1 21.2

Software Services Training Travel

09/30/2008 09/30/2008 09/30/2008 09/30/2008

$0.538 $0.342 $0.015 $0.067

09/30/2008 09/30/2008 09/30/2008 09/30/2008

$0.538 $0.342 $0.015 $0.067

% % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % %

21.3 21.4 21.5 22.1 22.2 22.3 23.1 23.2 23.3 24.1 24.2 24.3 24.4 24.5 1.3.1 1.3.2 4.3.2 4.3.3 7.3.3 7.3.3

% % % % % % % % % % % % % % 100% 100% 67% 0% % %

Project Totals

09/28/2012

09/28/2012 12/19/2005

You might also like