Exhibit 300: Part I: Summary Information and Justification (All Capital Assets)
Exhibit 300: Part I: Summary Information and Justification (All Capital Assets)
Exhibit 300: Part I: Summary Information and Justification (All Capital Assets)
Exhibit 300: Part I: Summary Information and Justification (All Capital Assets)
I.A. Overview
1. Date of Submission: 2. Agency: 3. Bureau: 4. Name of this Capital Asset: 5. Unique Project (Investment) Identifier: (For IT investment only, see section 53. For all other, use agency ID system.) 6. What kind of investment will this be in FY2008? (Please NOTE: Investments moving to O&M ONLY in FY2008, with Planning/Acquisition activities prior to FY2008 should not select O&M. These investments should indicate their current status.) 7. What was the first budget year this investment was submitted to OMB?
8/6/2006 Department of Justice Federal Bureau of Investigation FBI Next Generation Identification (NGI) 011-10-01-04-01-3199-00 Mixed Life Cycle
FY2006
8. Provide a brief summary and justification for this investment, including a brief description of how this closes in part or in whole an identified agency performance gap:
The Next Generation Identification (NGI) will be a major upgrade to the current Integrated Automated Fingerprint Identification System (IAFIS) that will provide new functionality, as well as, improve upon current functionality. The NGI, because it is a major upgrade to the existing IAFIS, was included in a previous IAFIS OMB 300 submission. In 2005, the NGI was separated from the IAFIS Exhibit 300 for Management Control purposes based on guidance from the FBI's Office of the Chief Information Officer (OCIO). The NGI Program is a compilation of initiatives that will either improve or expand existing biometric identification services. The NGI Program will accommodate increased information processing and sharing demands in support of anti-terrorism. As a result of the NGI initiatives, the FBI will be able to provide services to enhance interoperability between stakeholders at all levels of government, including local, state, federal, and international partners. This will accommodate the increasing need for pre-employment background checks, licenses, and will support the increase in border patrol and entry/exit checks. The NGI will allow the FBI to establish a terrorist fingerprint identification system that is compatible with other systems; increase the accessibility and number of the IAFIS terrorist fingerprint records; and provide latent palm print search capabilities. The NGI Study Contract was awarded to Intellidyne, L.L.C. on July 1, 2005. Intellidyne, L.L.C. and CJIS NGI representatives jointly participated in User Requirements Canvasses which included onsite interviews, telephonic interviews and written surveys resulting in the identification of over 1,000 new requirements, including high-priority, specialized requirements in the Latent Services, Facial Recognition, and Multi-modal Biometrics areas. The NGI PO Staff hosted the IAFIS Interface Evaluation Task Force (IIETF) which reconvened at the CJIS Division on April 11 and 12, 2006 to continue the assessment of the NGI user requirements. At the conclusion of the meeting, the IIETF members collectively endorsed the priority and categorization of the NGI user requirements. Establishing user requirements will be essential to the successful design and development of NGI.
9. Did the Agency's Executive/Investment Committee approve this request? a. If "yes," what was the date of this approval? 10. Did the Project Manager review this Exhibit? 11. Contact information of Project Manager? Name
Young, Chris A
304-625-2712 [email protected]
12. Has the agency developed and/or promoted cost effective, No energy efficient and environmentally sustainable techniques or practices for this project. a. Will this investment include electronic assets (including computers)?
Yes
b. Is this investment for new construction or major retrofit of No a Federal building or facility? (answer applicable to non-IT assets only) 1. If "yes," is an ESPC or UESC being used to help fund this investment? 2. If "yes," will this investment meet sustainable design principles? 3. If "yes," is it designed to be 30% more energy efficient than relevant code? 13. Does this investment support one of the PMA initiatives? If "yes," check all that apply: 13a. Briefly describe how this asset directly supports the identified initiative(s)?
Yes Expanded E-Government The NGI initiatives will allow the FBI to provide new services to state, local, and federal partners that supports the President's Management Agenda for electronic government. The FBI has worked with these partnering agencies through collaborative meetings such as the NGI workshop, Advisory Policy Board (APB) Working Group meetings, Compact Council, and the IAFIS Interface Evaluation Task Force (IIETF) meetings to identify new service requirements. No No
14. Does this investment support a program assessed using the Program Assessment Rating Tool (PART)? (For more information about the PART, visit www.whitehouse.gov/omb/part.) a. If "yes," does this investment address a weakness found during the PART review? b. If "yes," what is the name of the PART program assessed by OMB's Program Assessment Rating Tool? c. If "yes," what PART rating did it receive? 15. Is this investment for information technology?
Yes
If the answer to Question: "Is this investment for information technology?" was "Yes," complete this sub-section. If the answer is "No," do not answer this sub-section. For information technology investments only: 16. What is the level of the IT Project? (per CIO Council PM Guidance) 17. What project management qualifications does the Project Manager have? (per CIO Council PM Guidance): 18. Is this investment identified as "high risk" on the Q4 - FY 2006 agency high risk report (per OMB's "high risk" memo)? 19. Is this a financial management system?
Level 2 (4) Project manager assigned but qualification status review has not yet started Yes No
a. If "yes," does this investment address a FFMIA compliance No area? 1. If "yes," which compliance area: 2. If "no," what does it address? b. If "yes," please identify the system name(s) and system acronym(s) as reported in the most recent financial systems inventory update required by Circular A-11 section 52 20. What is the percentage breakout for the total FY2008 funding request for the following? (This should total 100%) Hardware Software Services
78 5 17
Other 21. If this project produces information dissemination products for the public, are these products published to the Internet in conformance with OMB Memorandum 05-04 and included in your agency inventory, schedules and priorities? Name
Kelley, Patrick W
0 N/A
Phone Number Title E-mail 23. Are the records produced by this investment appropriately scheduled with the National Archives and Records Administration's approval?
Provide the total estimated life-cycle cost for this investment by completing the following table. All amounts represent budget authority in millions, and are rounded to three decimal places. Federal personnel costs should be included only in the row designated "Government FTE Cost," and should be excluded from the amounts shown for "Planning," "Full Acquisition," and "Operation/Maintenance." The total estimated annual cost of the investment is the sum of costs for "Planning," "Full Acquisition," and "Operation/Maintenance." For Federal buildings and facilities, life-cycle costs should include long term energy, environmental, decommissioning, and/or restoration costs. The costs associated with the entire life-cycle of the investment should be included in this report.
Table 1: SUMMARY OF SPENDING FOR PROJECT PHASES (REPORTED IN MILLIONS) (Estimates for BY+1 and beyond are for planning purposes only and do not represent budget decisions) PY - 1 and Earlier
Planning Budgetary Resources Acquisition 12.522 5.084 5 0
PY 2006
CY 2007
BY 2008
BY + 1 2009
BY + 2 2010
BY + 3 2011
BY + 4 and Beyond
Total
Budgetary Resources Subtotal Planning & Acquisition Budgetary Resources Operations & Maintenance Budgetary Resources TOTAL Budgetary Resources Government FTE Costs Budgetary Resources Number of FTE represented by Costs:
Note: For the cross-agency investments, this table should include all funding (both managing partner and partner agencies). Government FTE Costs should not be included as part of the TOTAL represented. 2. Will this project require the agency to hire additional FTE's? a. If "yes," How many and in what year?
Yes 11, FY2006
3. If the summary of spending has changed from the FY2007 President's budget request, briefly explain those changes:
The following changes have be made to the summary of spending chart from that submitted within the FY 2007 President's Request: - The government FTE costs for the planning, acquisition, O&M and Total all Stages categories are only reflected within the Government FTE Costs area per the revised guidance. Prior year data has been updated to reflect actual expenditures to date. - The FBI generated a government Life Cycle Cost Estimate (LCCE) for NGI in Fiscal Year (FY) 2004 that was used to support the formulation of the FY 2006 budget enhancement request and OMB 300 Exhibit for NGI.
1. Complete the table for all (including all non-Federal) contracts and/or task orders currently in place or planned for this investment. Total Value should include all option years for each contract. Contracts and/or task orders completed do not need to be included.
Contracts/Task Orders Table:
3. Do the contracts ensure Section 508 compliance? a. Explain why: 4. Is there an acquisition plan which has been approved in accordance with agency requirements? a. If "yes," what is the date? b. If "no," will an acquisition plan be developed? 1. If "no," briefly explain why:
Yes Legislative Compliance No 12/7/2004 Yes An acquisition plan has been developed for the following contracts: DJJ-05C1113-D4 - 02/15/2004, DJJ-05-C-1114-WPR25 - 02/21/2006, DJJ-05-C-1114WPR10 - 03/31/2005. A draft acquisition plan was developed for the future development contract on 06/29/2006. An acquisition plan that encompasses the entire program is not required in the LCMD until the program reaches Gate II. Prior to NGI reaching that milestone, an acquisition plan will be developed that includes the entire life cycle of the in
In order to successfully address this area of the exhibit 300, performance goals must be provided for the agency and be linked to the annual performance plan. The investment must discuss the agency's mission and strategic goals, and performance measures must be provided. These goals need to map to the gap in the agency's strategic goals and objectives this investment is designed to fill. They are the internal and external performance benefits this investment is expected to deliver to the agency (e.g., improve efficiency by 60 percent, increase citizen participation by 300 percent a year to achieve an overall citizen participation rate of 75 percent by FY 2xxx, etc.). The goals must be clearly measurable investment outcomes, and if applicable, investment outputs. They do not include the completion date of the module, milestones, or investment, or general goals, such as, significant, better, improved that do not have a quantitative or qualitative measure. Agencies must use Table 1 below for reporting performance goals and measures for all non-IT investments and for existing IT investments that were initiated prior to FY 2005. The table can be extended to include measures for years beyond FY 2006.
Performance Information Table 1: Fiscal Year Strategic Goal(s) Supported Performance Measure Actual/baseline (from Previous Year) Planned Performance Metric (Target) Performance Metric Results (Actual)
All new IT investments initiated for FY 2005 and beyond must use Table 2 and are required to use the Federal Enterprise Architecture (FEA) Performance Reference Model (PRM). Please use Table 2 and the PRM to identify the performance
information pertaining to this major IT investment. Map all Measurement Indicators to the corresponding "Measurement Area" and "Measurement Grouping" identified in the PRM. There should be at least one Measurement Indicator for at least four different Measurement Areas (for each fiscal year). The PRM is available at www.egov.gov.
Performance Information Table 2: Fiscal Measurement Year Area 2005 Customer Results Measurement Category Service Accessibility Measurement Grouping Access Measurement Indicator Record Retention Percentage Baseline 46% of criminal arrests retained in the IAFIS repository contain disposition information. Planned Improvement to the Baseline The number of criminal arrests that contain disposition information retained in the IAFIS repository will increase to 55% within one year of new capability. NGI response is generated to authorized agency within 24 hours. Actual Results NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in
2005
Customer Results
Service Accessibility
Access
2005
Customer Results
Service Coverage
IAFIS currently accepts flat 100% of Agencies transmitting fingerprint impressions on a civil applicant fingerprint very limited basis. submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions. IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.
2005
Customer Results
Service Coverage
Service Efficiency
2005
Customer Results
Service Coverage
Service Efficiency
NGI will increase the IAFIS daily latent search capability to 1500 transactions per day
FY2010. 2005 Customer Results Timeliness and Responsiveness Response Time Criminal Ten Print Response Time IAFIS processes 95% of electronic criminal ten-print transactions within two hours. NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009 NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009.
2005
Customer Results
Response Time
NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.
2005
Homeland Security
No IAFIS capability to provide a fast response to searches of a known or suspected terrorist and wanted person database.
2005
Law Enforcement
Crime Prevention
Accept and Store No IAFIS capability to rate for palm prints accept and store palm print submissions from local, state, and federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. No rap back functionality currently exists within IAFIS. Authorized participating agencies can not be electronically
Add capability to accept and store up to 10,000 palm print submissions per day from state, local, and federal law enforcement agencies
2005
Law Enforcement
Crime Prevention
Enhancement is in planning and development phase to add capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.
2005
Law Enforcement
Crime Prevention
NGI Rap back notifications will NGI is in the be provided within 24 hours of planning phase. arrest submission. Expected functionality is planned to be
notified when an enrolled employee has a subsequent arrest. 2005 Processes and Activities Productivity and Efficiency Efficiency Manual QC Process rate 50% of all ten-print submissions require a manual QC process. QC Automation will reduce the manual QC function to approximately 25% of all tenprint transactions
delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2007.
2005
Reject rate for FY 04 was approximately 5%. Inconsistent manual QC decisions result in a higher number of rejects.
QC Automation will reduce the NGI is in the ten-print transactions reject planning phase. rate to 4%. Expected functionality is planned to be delivered in FY2007. Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is
2005
Technology
Efficiency
Improvement
Accuracy Rate
2005
Technology
Quality
Functionality
Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos
2005
Technology
Quality
Functionality
Capacity Rate
The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new photos and these photos capabilities. can only be accepted when submitted with an arrest transaction. Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS Increase the number of photos submitted to 10 per arrest transaction and increase the number of photo sets per FBI
2005
Technology
Quality
Functionality
will retain up to ten photo sets per FBI record. 2005 Technology Reliability and Availability Availability System Availability IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%.
record to 25.
planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is
NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime.
2005
Technology
Reliability
2006
Customer Results
Service Accessibility
Access
46% of criminal arrests retained in the IAFIS repository contain disposition information.
The number of criminal arrests that contain disposition information retained in the IAFIS repository will increase to 55% within one year of new capability. NGI response is generated to authorized agency within 24 hours.
2006
Customer Results
Service Accessibility
Access
2006
Customer Results
Service Coverage
IAFIS currently accepts flat 100% of Agencies transmitting fingerprint impressions on a civil applicant fingerprint very limited basis. submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions. IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.
2006
Customer Results
Service Coverage
Service Efficiency
planned to be delivered in FY2010. 2006 Customer Results Service Coverage Service Efficiency Latent Search Capability IAFIS daily latent search capability is 1052 transactions per day. NGI will increase the IAFIS daily latent search capability to 1500 transactions per day. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is
2006
Customer Results
Response Time
IAFIS processes 95% of electronic criminal ten-print transactions within two hours.
NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes.
2006
Customer Results
Response Time
NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.
2006
Homeland Security
No IAFIS capability to provide a fast response to searches of a known or suspected terrorist and wanted person database.
2006
Law Enforcement
Crime Prevention
Accept and Store No IAFIS capability to rate for palm prints accept and store palm print submissions from local, state, and federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list
Add capability to accept and store up to 10,000 palm print submissions per day from state, local, and federal law enforcement agencies
2006
Law Enforcement
Crime Prevention
Enhancement is in planning and development phase to add capability to search palm prints against a repository to
of candidates for latent palm print comparison to support criminal investigations. 2006 Mission and Business Results Law Enforcement Crime Prevention Response Time for Rap Back Notification
provide a list of candidates for planned to be latent palm print comparison delivered in to support criminal FY2009. investigations NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2007.
No rap back functionality NGI Rap back notifications will currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. 50% of all ten-print submissions require a manual QC process. QC Automation will reduce the manual QC function to approximately 25% of all tenprint transactions.
2006
2006
Reject rate for FY 04 was approximately 5%. Inconsistent manual QC decisions result in a higher number of rejects.
QC Automation will reduce the NGI is in the ten-print transactions reject planning phase. rate to 4%. Expected functionality is planned to be delivered in FY2007. Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase.
2006
Technology
Efficiency
Improvement
Accuracy Rate
2006
Technology
Quality
Functionality
Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos.
2006
Technology
Quality
Functionality
Capacity Rate
The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new
photos and these photos capabilities. can only be accepted when submitted with an arrest transaction. 2006 Technology Quality Functionality Increase Capacity per record Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS will retain up to ten photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. Increase the number of photos submitted to 10 per arrest transaction and increase the number of photo sets per FBI record to 25.
Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.
2006
Technology
Availability
System Availability
NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime.
2006
Technology
Reliability
2007
Customer Results
Service Accessibility
Access
46% of criminal arrests retained in the IAFIS repository contain disposition information.
The number of criminal arrests that contain disposition information retained in the IAFIS repository will increase to 55% within one year of new capability. NGI response is generated to authorized agency within 24 hours.
2007
Customer Results
Service Accessibility
Access
2007
Customer Results
Service Coverage
IAFIS currently accepts flat 100% of Agencies transmitting NGI is in the fingerprint impressions on a civil applicant fingerprint planning phase.
Penetration
submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions.
Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2008. NGI is in the planning phase.
2007
Customer Results
Service Coverage
Service Efficiency
IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.
2007
Customer Results
Service Coverage
Service Efficiency
NGI will increase the IAFIS daily latent search capability to 1500 transactions per day.
2007
Customer Results
Response Time
IAFIS processes 95% of electronic criminal ten-print transactions within two hours.
NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes.
2007
Customer Results
Response Time
NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.
2007
Homeland Security
No IAFIS capability to provide a fast response to searches of a known or suspected terrorist and wanted person database.
2007
Law Enforcement
Crime Prevention
Accept and Store No IAFIS capability to Add capability to accept and rate for palm prints accept and store palm print store up to 10,000 palm print
Results
submissions from local, submissions per day from state, and federal law state, local, and federal law enforcement and criminal enforcement agencies. justice agencies nationwide. Law Enforcement Crime Prevention Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. Enhancement is in planning and development phase to add capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.
Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.
2007
2007
Law Enforcement
Crime Prevention
No rap back functionality NGI Rap back notifications will currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. 50% of all ten-print submissions require a manual QC process. Reject rate for FY 04 was approximately 5%. Inconsistent manual QC decisions result in a higher number of rejects. The AFIS accuracy rate for ten print transactions is 95%
2007
QC Automation will reduce the TBD manual QC function to approximately 25% of all tenprint transactions. QC Automation will reduce the TBD ten-print transactions reject rate to 4%.
2007
2007
Technology
Efficiency
Improvement
Accuracy Rate
Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible.
NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be
2007
Technology
Quality
Functionality
Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos.
delivered in FY2009. 2007 Technology Quality Functionality Capacity Rate The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new photos and these photos capabilities. can only be accepted when submitted with an arrest transaction. Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS will retain up to ten photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. Increase the number of photos submitted to 10 per arrest transaction and increase the number of photo sets per FBI record to 25. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.
2007
Technology
Quality
Functionality
2007
Technology
Availability
System Availability
NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime.
2007
Technology
Reliability
2008
Customer Results
Service Accessibility
Access
46% of criminal arrests retained in the IAFIS repository contain disposition information.
The number of criminal arrests TBD that contain disposition information retained in the IAFIS repository will increase to 55% within one year of new capability. NGI response is generated to authorized agency within 24 hours. NGI is in the planning phase. Expected functionality is planned to be delivered in
2008
Customer Results
Service Accessibility
Access
FY2010. 2008 Customer Results Service Coverage Frequency and Depth Latent Search Capability IAFIS daily latent search capability is 1052 transactions per day. NGI will increase the IAFIS daily latent search capability to 1500 transactions per day. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD
2008
Customer Results
Service Coverage
IAFIS currently accepts flat 100% of Agencies transmitting fingerprint impressions on a civil applicant fingerprint very limited basis. submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions. IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.
2008
Customer Results
Service Coverage
Service Efficiency
2008
Customer Results
Response Time
IAFIS processes 95% of electronic criminal ten-print transactions within two hours.
NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes.
2008
Customer Results
Response Time
NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.
2008
Homeland Security
No IAFIS capability to provide a fast response to searches of a known or suspected terrorist and wanted person database.
2008
Law Enforcement
Crime Prevention
Accept and Store No IAFIS capability to rate for palm prints accept and store palm print submissions from local, state, and federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.
Add capability to accept and store up to 10,000 palm print submissions per day from state, local, and federal law enforcement agencies.
NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD
2008
Law Enforcement
Crime Prevention
Enhancement is in planning and development phase to add capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.
2008
Law Enforcement
Crime Prevention
No rap back functionality NGI Rap back notifications will currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions.
2008
2008
Reject rate for is 4% due to Maintain reject rate of 4%. the automation of QC. The AFIS accuracy rate for ten print transactions is 95% Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible.
TBD
2008
NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be
2008
Technology
Quality
Functionality
Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos.
delivered in FY2009. 2008 Technology Quality Functionality Capacity Rate The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new photos and these photos capabilities. can only be accepted when submitted with an arrest transaction. Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS will retain up to ten photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. Increase the number of photos submitted to 10 per arrest transaction and increase the number of photo sets per FBI record to 25. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2009. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.
2008
Technology
Quality
Functionality
2008
Technology
Availability
System Availability
NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime.
2008
Technology
Reliability
2009
Customer Results
Service Accessibility
Access
55% of criminal arrests retained in the IAFIS repository will contain disposition information. No capability for electronic civil file searches within IAFIS.
60% of criminal arrests will TBD contain disposition information within the IAFIS repository. NGI response is generated to authorized agency within 24 hours. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.
2009
Customer Results
Service Accessibility
Access
2009
Customer Results
Service Coverage
IAFIS currently accepts flat 100% of Agencies transmitting TBD fingerprint impressions on a civil applicant fingerprint very limited basis. submissions will have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions. IAFIS is currently capable NGI will allow IAFIS to process of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD
2009
Customer Results
Service Coverage
Service Efficiency
2009
Customer Results
Service Coverage
Service Efficiency
NGI will increase the IAFIS daily latent search capability to 1500 transactions per day.
2009
Customer Results
Response Time
IAFIS processes 95% of electronic criminal ten-print transactions within two hours.
NGI will allow IAFIS to process 95% of electronic criminal tenprint transactions within 15 minutes.
2009
Customer Results
Response Time
NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.
2009
Homeland Security
Respond to 80% of all ETIS Maintain 80% of all ETIS transactions within 10 transactions to complete seconds. within 10 seconds.
2009
Law Enforcement
Crime Prevention
Accept and Store No IAFIS capability to Add capability to accept and rate for palm prints accept and store palm print store up to 10,000 palm print
TBD
Results
submissions from local, submissions per day from state, and federal law state, local, and federal law enforcement and criminal enforcement agencies. justice agencies nationwide. Law Enforcement Crime Prevention Palm Print Search Capability IAFIS capability does not exist to search submitted palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. Enhancement is in planning TBD and development phase to add capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD
2009
2009
Law Enforcement
Crime Prevention
No rap back functionality NGI Rap back notifications will currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions.
2009
2009
Reject rate for is 4% due to Maintain reject rate of 4%. the automation of QC. The AFIS accuracy rate for ten print transactions is 95% Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible.
TBD
2009
NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. TBD
2009
Technology
Quality
Functionality
Currently there is no search Allow search capability for capability for photos facial, scar, mark, and tattoo contained within the IPS. photos. The Interstate Photo Increase the IPS by 20% System contains 1,284,518 within one year of these new photos and these photos capabilities. can only be accepted when
2009
Technology
Quality
Functionality
TBD
submitted with an arrest transaction. 2009 Technology Quality Functionality Increase Capacity per record Currently IAFIS will accept four photos with each arrest transaction (known as a photo set). The IPS will retain up to ten photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. Increase the number of photos TBD submitted to 10 per arrest transaction and increase the number of photo sets per FBI record to 25. NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010. NGI is in the planning phase. Expected functionality is planned to be delivered in FY2010.
2009
Technology
Availability
System Availability
2009
Technology
Reliability
2010
Customer Results
Service Accessibility
Access
55% of criminal arrests retained in the IAFIS repository will contain disposition information. No capability for electronic civil file searches within IAFIS. 100% of Agencies transmitting civil applicant fingerprint submissions will have the capability to submit ten-flat fingerprint impressions instead of tenrolled fingerprint impressions.
60% of criminal arrests will TBD contain disposition information within the IAFIS repository. NGI response is generated to authorized agency within 24 hours. TBD
2010
Access
2010
Maintain the ability for 100% TBD of Agencies transmitting civil applicant fingerprint submissions to have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions.
2010
Customer Results
Service Coverage
Service Efficiency
IAFIS is currently capable NGI will allow IAFIS to process TBD of processing 160,000 ten- 200,000 ten-print transactions print transactions per day. per day with increased scalability.
2010
IAFIS daily latent search capability is 1052 transactions per day. IAFIS processes 95% of electronic criminal ten-print transactions within two hours. IAFIS processes 99% of electronic civil ten-print transactions within 24 hours.
NGI will increase the IAFIS daily latent search capability to 1500 transactions per day.
TBD
2010
NGI will allow IAFIS to process TBD 95% of electronic criminal tenprint transactions within 15 minutes. NGI will be capable of processing 99% of electronic civil ten-print transactions within 8 hours. TBD
2010
Customer Results
Response Time
2010
Homeland Security
Respond to 80% of all ETIS Maintain 80% of all ETIS transactions within 10 transactions to complete seconds within 10 seconds.
TBD
2010
Law Enforcement
Crime Prevention
Accept and Store Capability to accept and rate for palm prints store up to 10,000 palm print submissions per day from state, local, and federal law enforcement agencies. Palm Print Search Capability Capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.
Increase the number of palm print submissions accepted and stored by 10%.
TBD
2010
Law Enforcement
Crime Prevention
Maintain capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.
TBD
2010
Law Enforcement
Crime Prevention
No rap back functionality NGI Rap back notifications will TBD currently exists within be provided within 24 hours of IAFIS. Authorized arrest submission. participating agencies can not be electronically notified when an enrolled employee has a subsequent arrest. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions. TBD
2010
2010
Processes and
Ten Print
TBD
the automation of QC. The AFIS accuracy rate for ten print transactions is 95% Capability to search capability for facial, scar, mark, and tattoo photos. Increase the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. Maintain search capability for facial, scar, mark, and tattoo photos. TBD
2010
Technology
Quality
Functionality
TBD
2010
Technology
Quality
Functionality
The Interstate Photo Increase the number of IPS System will contain at least photos by 10%. 1,541,421 photos. IAFIS will accept 10 photos per arrest transaction and maintain 25 photo sets per FBI record. IAFIS is available 24 hours a day, 7 days a week, with only 4 hours a month for scheduled system outages for maintenance or upgrades. The IAFIS search penetration rate is 30%. 60% of criminal arrests retained in the IAFIS repository will contain disposition information. IAFIS civil response generation to authorized agencies within 24 hours. 100% of Agencies transmitting civil applicant fingerprint submissions will have the capability to submit ten-flat fingerprint impressions instead of tenrolled fingerprint impressions.
TBD
2010
Technology
Quality
Functionality
Continue to accept 10 photos TBD per arrest transaction and maintain 25 photo sets per FBI record. NGI will allow system availability 24 hours a day, 7 days a week, 365 days a year with 0 downtime. TBD
2010
Technology
Availability
System Availability
2010
Technology
Reliability
TBD
2011
Customer Results
Access
65% of criminal arrests will TBD contain disposition information within in the IAFIS repository. Maintain IAFIS civil response generation to authorized agencies within 24 hours. TBD
2011
Access
2011
Maintain the ability for 100% TBD of Agencies transmitting civil applicant fingerprint submissions to have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions.
2011
Customer Results
Service Coverage
Service Efficiency
IAFIS will be capable of processing 200,000 tenprint transactions per day with increased scalability. IAFIS daily latent search capability will be 1500 transactions per day. IAFIS will process 95% of electronic criminal ten-print transactions within 15 minutes. IAFIS will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.
Maintain ability for IAFIS to process 200,000 ten-print transactions per day with increased scalability.
TBD
2011
Customer Results
Service Coverage
Service Efficiency
Maintain IAFIS daily latent TBD search capability at a minimum of 1500 transactions per day. Maintain ability for IAFIS to TBD process 95% of electronic criminal ten-print transactions within 15 minutes. Maintain IAFIS capability of processing 99% of electronic civil ten-print transactions within 8 hours. TBD
2011
Customer Results
Response Time
2011
Customer Results
Response Time
2011
Homeland Security
Respond to 80% of all ETIS Maintain 80% of all ETIS transactions within 10 transactions to complete seconds. within 10 seconds.
TBD
2011
Law Enforcement
Crime Prevention
Accept and Store Accept and store 11,000 Increase the number of palm rate for palm prints palm print submissions per print submissions accepted day from local, state, and and stored by 10%. federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability Capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. Maintain capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.
TBD
2011
Law Enforcement
Crime Prevention
TBD
2011
Law Enforcement
Crime Prevention
IAFIS will provide Rap back Maintain IAFIS ability to TBD notifications within 24 provide Rap back notifications hours of arrest submission. within 24 hours of arrest submission. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions. TBD
2011
2011
Reject rate for is 4% due to Maintain reject rate of 4%. the automation of QC. The AFIS accuracy rate for ten print transactions will be as close to 100% as technically feasible. Capability to search capability for facial, scar, mark, and tattoo photos. Maintain the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. Maintain search capability for facial, scar, mark, and tattoo photos.
TBD
2011
TBD
2011
Technology
Quality
Functionality
TBD
2011
Technology
Quality
Functionality
The Interstate Photo Increase the number of IPS System will contain at least photos by 10%. 1,695,563 photos. IAFIS will accept 10 photos per arrest transaction and maintain 25 photo sets per FBI record. IAFIS will be available 24 hours a day, 7 days a week, with 0 system outages for maintenance or upgrades. The IAFIS search penetration rate will be 60%. 65% of criminal arrests retained in the IAFIS repository will contain disposition information. IAFIS civil response generation to authorized agencies within 24 hours. 100% of Agencies transmitting civil applicant fingerprint submissions will have the capability to submit ten-flat fingerprint impressions instead of tenrolled fingerprint impressions.
TBD
2011
Technology
Quality
Functionality
Continue to accept 10 photos TBD per arrest transaction and maintain 25 photo sets per FBI record. Maintain IAFIS availability 24 hours a day, 7 days a week, with 0 system outages for maintenance or upgrades. Maintain IAFIS search penetration rate at 60%. Maintain at least 65% of criminal arrests with disposition information within in the IAFIS repository. Maintain IAFIS civil response generation to authorized agencies within 24 hours. TBD
2011
Technology
Availability
System Availability
2011
Technology
Reliability
TBD
2012
Customer Results
Access
TBD
2012
Access
TBD
2012
Maintain the ability for 100% TBD of Agencies transmitting civil applicant fingerprint submissions to have the capability to submit ten-flat fingerprint impressions instead of ten-rolled fingerprint impressions.
2012
Customer Results
Service Coverage
Service Efficiency
IAFIS will be capable of processing 200,000 tenprint transactions per day with increased scalability. IAFIS daily latent search capability will be 1500 transactions per day. IAFIS will process 95% of electronic criminal ten-print transactions within 15 minutes. IAFIS will be capable of processing 99% of electronic civil ten-print transactions within 8 hours.
Maintain ability for IAFIS to process 200,000 ten-print transactions per day with increased scalability.
TBD
2012
Customer Results
Service Coverage
Service Efficiency
Maintain IAFIS daily latent TBD search capability at a minimum of 1500 transactions per day. Maintain ability for IAFIS to TBD process 95% of electronic criminal ten-print transactions within 15 minutes. Maintain IAFIS capability of processing 99% of electronic civil ten-print transactions within 8 hours. TBD
2012
Customer Results
Response Time
2012
Customer Results
Response Time
2012
Homeland Security
Respond to 80% of all ETIS Maintain 80% of all ETIS transactions within 10 transactions to complete seconds. within 10 seconds.
TBD
2012
Law Enforcement
Crime Prevention
Accept and Store Accept and store 12,100 Increase the number of palm rate for palm prints palm print submissions per print submissions accepted day from local, state, and and stored by 10%. federal law enforcement and criminal justice agencies nationwide. Palm Print Search Capability Capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations. Maintain capability to search palm prints against a repository to provide a list of candidates for latent palm print comparison to support criminal investigations.
TBD
2012
Law Enforcement
Crime Prevention
TBD
2012
Law Enforcement
Crime Prevention
IAFIS will provide Rap back Maintain IAFIS ability to TBD notifications within 24 provide Rap back notifications hours of arrest submission. within 24 hours of arrest submission. Approximately 25% of all ten-print submissions will require a manual QC process. Maintain manual QC processing at no more than 25% of all ten-print transactions. TBD
2012
2012
Reject rate for is 4% due to Maintain reject rate of 4%. the automation of QC. The AFIS accuracy rate for ten print transactions will be as close to 100% as technically feasible. Capability to search capability for facial, scar, mark, and tattoo photos. Maintain the AFIS accuracy rate for ten print transactions to as close to 100% as technically feasible. Maintain search capability for facial, scar, mark, and tattoo photos.
TBD
2012
TBD
2012
Technology
Quality
Functionality
TBD
2012
Technology
Quality
Functionality
The Interstate Photo Increase the number of IPS System will contain at least photos by 10%. 1,865,119 photos. IAFIS will accept 10 photos per arrest transaction and maintain 25 photo sets per FBI record. IAFIS will be available 24 hours a day, 7 days a week, with 0 system outages for maintenance or upgrades. The IAFIS search penetration rate will be 60%.
TBD
2012
Technology
Quality
Functionality
Continue to accept 10 photos TBD per arrest transaction and maintain 25 photo sets per FBI record. Maintain IAFIS availability 24 hours a day, 7 days a week, with 0 system outages for maintenance or upgrades. Maintain IAFIS search penetration rate at 60%. TBD
2012
Technology
Availability
System Availability
2012
Technology
Reliability
TBD
In order to successfully address this area of the business case, each question below must be answered at the system/application level, not at a program or agency level. Systems supporting this investment on the planning and operational systems security tables should match the systems on the privacy table below. Systems on the Operational Security Table must be included on your agency FISMA system inventory and should be easily referenced in the inventory (i.e., should use the same name or identifier). All systems supporting and/or part of this investment should be included in the tables below, inclusive of both agency owned systems and contractor systems. For IT investments under development, security and privacy planning must proceed in parallel with the development of the system/s to ensure IT security and privacy requirements and costs are identified and
incorporated into the overall lifecycle of the system/s. Please respond to the questions below and verify the system owner took the following actions: 1. Have the IT security costs for the system(s) been identified and integrated into the overall costs of the investment: a. If "yes," provide the "Percentage IT Security" for the budget year: 2. Is identifying and assessing security and privacy risks a part of the overall risk management effort for each system supporting or part of this investment.
3. Systems in Planning - Security Table:
Name of System Agency/ or Contractor Operated System? Planned Operational Date Planned or Actual C&A Completion Date
Advanced Fingerprint Identification Technology (AFIT) Government Only Disposition Reporting Improvements Enhanced IAFIS Repository Enhanced Terrorist Identification Service (ETIS) Interstate Photo System (IPS) Enhancements National Palm Print System Quality Check Automation Government Only Government Only Government Only Government Only Government Only Government Only
IAFIS
Yes
5/16/2006
2/17/2006
4/20/2006
5. Have any weaknesses related to any of the systems part of or supporting this investment been identified by the agency or IG? a. If "yes," have those weaknesses been incorporated agency's plan of action and milestone process? 6. Indicate whether an increase in IT security funding is requested to remediate IT security weaknesses? a. If "yes," specify the amount, provide a general description of the weakness, and explain how the funding request will remediate the weakness.
7. How are contractor security procedures monitored, verified, validated by the agency for the contractor systems above?
FBI personnel operate the system in conjunction with support contractors that are on-site at the CJIS Division facility. The contractors receive an annual security awareness briefing in conjunction with the FBI briefings. All security incidents are reported to the CJIS Chief Security Officer. The COTR is responsible for assuring the security requirements and procedures identified in the contract are adhered to by the contractors, through site visits and performance reviews. The COTR is supported in this endeavor by the ISSM, ISSO and other CJIS Contract Administration Office staff members who review all contract modifications. Security-specific requirements are included as part of the Statements of Work to ensure contractors are aware of their responsibilities. Additionally, for those contractors who work at an off-site location, an In-Plant Security Plan is required. This Plan is verified by FBI personnel prior to the contractors beginning work on an FBI project. Site visits are also performed on an annual basis to ensure the security requirements remain in effect. 8. Planning & Operational Systems - Privacy Table:
Name of System Is this a new system? Is there a Privacy Impact Assessment (PIA) that covers this system? Is the PIA available to the public? Is a System of Records Notice (SORN) required for this system? Was a new or amended SORN published in FY 06?
IAFIS (NGI)
No
Yes.
Yes.
Yes
No, because the existing Privacy Act system of records was not substantially revised in FY 06.
In order to successfully address this area of the business case and capital asset plan you must ensure the investment is included in the agency's EA and Capital Planning and Investment Control (CPIC) process, and is mapped to and supports the FEA. You must also ensure the business case demonstrates the relationship between the investment and the business, performance, data, services, application, and technology layers of the agency's EA. 1. Is this investment included in your agency's target enterprise architecture? a. If "no," please explain why? 2. Is this investment included in the agency's EA Transition Strategy? a. If "yes," provide the investment name as identified in the Transition Strategy provided in the agency's most recent annual EA Assessment. b. If "no," please explain why?
Yes Next Generation IAFIS Yes
3. Service Reference Model (SRM) Table: Identify the service components funded by this major IT investment (e.g., knowledge management, content management, customer relationship management, etc.). Provide this information in the format of the following table. For detailed guidance regarding components, please refer to http://www.whitehouse.gov/omb/egov/. Agency Component Name Agency Component Description Service Domain Back Office Services Back Office Services Business Analytical Services Customer Services Customer Services Digital Asset Services Digital Asset Services Digital Asset Services Digital Asset Services Digital Asset Services FEA SRM Service Type Data Management Data Management Analysis and Statistics Customer Preferences Customer Relationship Management Document Management Document Management Knowledge Management Knowledge Management Knowledge Management FEA SRM Component Extraction and Transformation Loading and Archiving Forensics Alerts and Notifications Customer Feedback Indexing Library / Storage Information Retrieval Knowledge Capture Knowledge Distribution and Delivery FEA Service Component Reused Name FEA Service Component Reused UPI Internal or External Reuse? No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse No Reuse 5 5 20 10 5 5 5 5 20 20 BY Funding Percentage
Use existing SRM Components or identify as "NEW". A "NEW" component is one not already identified as a service component in the FEA SRM. A reused component is one being funded by another investment, but being used by this investment. Rather than answer yes or no, identify the reused service component funded by the other investment and identify the other investment using the Unique
Project Identifier (UPI) code from the OMB Ex 300 or Ex 53 submission. 'Internal' reuse is within an agency. For example, one agency within a department is reusing a service component provided by another agency within the same department. 'External' reuse is one agency within a department reusing a service component provided by another agency in another department. A good example of this is an E-Gov initiative service being reused by multiple organizations across the federal government. Please provide the percentage of the BY requested funding amount used for each service component listed in the table. If external, provide the funding level transferred to another agency to pay for the service.
4. Technical Reference Model (TRM) Table: To demonstrate how this major IT investment aligns with the FEA Technical Reference Model (TRM), please list the Service Areas, Categories, Standards, and Service Specifications supporting this IT investment. FEA SRM Component Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and Delivery FEA TRM Service Area Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework FEA TRM Service Category Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic Business Logic FEA TRM Service Standard Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Independent Platform Independent Platform Independent Platform Independent Platform Independent Platform Independent Platform Independent Service Specification (i.e. vendor or product name)
Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Customer Feedback Information Retrieval Knowledge Capture Knowledge Distribution and
Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework Component Framework
Business Logic Business Logic Business Logic Data Management Data Management Data Management Data Management Data Management Data Management Data Management Data Management Data Management Data Management Security Security Security Security Security Security Security Security Security Security
Platform Independent Platform Independent Platform Independent Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Database Connectivity Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Supporting Security Services Web Browser Web Browser Web Browser Web Browser Web Browser Web Browser Web Browser
Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels
Delivery Forensics Loading and Archiving Extraction and Transformation Alerts and Notifications Indexing Library / Storage Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Indexing Library / Storage Customer Feedback Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Indexing Library / Storage Customer Feedback Alerts and Notifications Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Access Channels Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Requirements Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Access and Delivery Service Transport Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Interface and Integration Integration Integration Integration Web Browser Web Browser Web Browser Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Legislative / Compliance Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Supporting Network Services Middleware Middleware Middleware Middleware
Integration Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Indexing Library / Storage Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Indexing Library / Storage Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Interface and Integration Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Integration Integration Integration Integration Integration Integration Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Middleware Middleware Middleware Middleware Middleware Middleware Database Database Database Database Database Database Database Database Database Database Storage Storage Storage
Infrastructure Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Indexing Library / Storage Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Indexing Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Database / Storage Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Delivery Servers Hardware / Infrastructure Hardware / Storage Storage Storage Storage Storage Storage Storage Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Application Servers Embedded Technology Devices Embedded Technology
Infrastructure Library / Storage Alerts and Notifications Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and
Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware /
Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Embedded Technology Devices Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Network Devices / Standards
Infrastructure Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and
Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Network Devices / Standards Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals Peripherals
Transformation Customer Feedback Alerts and Notifications Library / Storage Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and
Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and
Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Hardware / Infrastructure Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Servers / Computers Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration Management Software Configuration
Transformation Library / Storage Alerts and Notifications Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and Transformation Customer Feedback Alerts and Notifications Library / Storage Indexing Information Retrieval Knowledge Capture Knowledge Distribution and Delivery Forensics Loading and Archiving Extraction and
Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Infrastructure Service Platform and Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Software Engineering Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms Support Platforms
Management Test Management Test Management Test Management Test Management Test Management Test Management Test Management Test Management Test Management Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent Platform Dependent
Transformation
Infrastructure
Service Components identified in the previous question should be entered in this column. Please enter multiple rows for FEA SRM Components supported by multiple TRM Service Specifications In the Service Specification field, Agencies should provide information on the specified technical standard or vendor product mapped to the FEA TRM Service Standard, including model or version numbers, as appropriate. 5. Will the application leverage existing components and/or applications across the Government (i.e., FirstGov, Pay.Gov, etc)? a. If "yes," please describe. 6. Does this investment provide the public with access to a government automated information system? a. If "yes," does customer access require specific software (e.g., a specific web browser version)? 1. If "yes," provide the specific product name(s) and version number(s) of the required software and the date when the public will be able to access this investment by any software (i.e. to ensure equitable and timely access of government information and services).
No No
Part II should be completed only for investments identified as "Planning" or "Full Acquisition," or "Mixed Life-Cycle" investments in response to Question 6 in Part I, Section A above. In selecting the best capital asset, you should identify and consider at least three viable alternatives, in addition to the current baseline, i.e., the status quo. Use OMB Circular A- 94 for all investments, and the Clinger Cohen Act of 1996 for IT investments, to determine the criteria you should use in your Benefit/Cost Analysis.
1. Did you conduct an alternatives analysis for this project? a. If "yes," provide the date the analysis was completed? b. If "no," what is the anticipated date this analysis will be completed? c. If no analysis is planned, please briefly explain why:
Yes 4/1/2005
2. Alternative Analysis Results: Use the results of your alternatives analysis to complete the following table: Send to OMB Alternative Analyzed Description of Alternative Risk Adjusted Lifecycle Costs Risk Adjusted Lifecycle Benefits estimate estimate
True
System Evolution using COTS Products (Previous submission did not account for O&M costs in FY 2011 & FY 2010)
418.944
96.501
3. Which alternative was selected by the Agency's Executive/Investment Committee and why was it chosen?
The NGI will most likely be developed using alternative 3, COTS products. This is a viable alternative due to the timeliness of the implementation, availability of the COTS products, the advantages related to interoperability and information sharing, and the technical support available through the vendor. However, the upcoming detailed NGI studies will determine the chosen NGI alternative.
modification, expungement, response generation, and file maintenance of civil and criminal information. Interstate Photo System (IPS) Enhancements Benefits: Easier submission and retrieval of photos into database; increased number of photos retained; new search capabilities will help to solve crimes; ability to collect and retain data to field facial identification services in a future multi-modal system. FBI National Palm Print System (NPPS) Benefits: Will allow for identification of more prints (estimates are that 30 percent of latent lifts are made from palm prints); provides an additional tool to solve more
You should have performed a risk assessment during the early planning and initial concept phase of this investment's lifecycle, developed a risk-adjusted life-cycle cost estimate and a plan to eliminate, mitigate or manage risk, and be actively managing risk throughout the investment's life-cycle. 1. Does the investment have a Risk Management Plan? a. If "yes," what is the date of the plan? b. Has the Risk Management Plan been significantly changed since last year's submission to OMB? c. If "yes," describe any significant changes: 2. If there currently is no plan, will a plan be developed? a. If "yes," what is the planned completion date? b. If "no," what is the strategy for managing the risks? 3. Briefly describe how investment risks are reflected in the life cycle cost estimate and investment schedule:
The lifecycle costs estimates and investment schedule will be updated based on the detailed functionality and cost benefit analysis that will be defined by the requirements study contractor (IntelliDyne, LLC). The NGI PO has set aside an 18 percent management reserve out of the $42,742,000 that was received in Fiscal Year 2005 from the Working Capital Fund to be utilized to address any risk mitigation costs. It is anticipated that as the Project matures, the management reserve will decrease to approximately 10 percent of the annual funding that is received for the project. In addition, the FBI NGI Risk Register will identify the potential costs associated with mitigation strategies with a risk exposure of six or higher. The NGI PO is planning slack within the schedule to account for risks that will affect the delivery of initiatives Yes 11/15/2005 No
Yes
criteria in ANSI/EIA Standard-748? 2. Answer the following questions about current cumulative cost and schedule performance. The numbers reported below should reflect current actual information. (Per OMB requirements Cost/Schedule Performance information should include both Government and Contractor Costs): a. What is the Planned Value (PV)? b. What is the Earned Value (EV)? c. What is the actual cost of work performed (AC)? d. What costs are included in the reported Cost/Schedule Performance information (Government Only/Contractor Only/Both)? e. "As of" date: 3. What is the calculated Schedule Performance Index (SPI= EV/PV)? 4. What is the schedule variance (SV = EV-PV)? 5. What is the calculated Cost Performance Index (CPI = EV/AC)? 6. What is the cost variance (CV=EV-AC)?
9.51 9.51 8.3990 Contractor and Government
7. Is the CV% or SV% greater than +/- 10%? (CV%= CV/EV x Yes 100; SV%= SV/PV x 100) a. If "yes," was it the? b. If "yes," explain the variance:
The Requirements Study Contract is currently under budget (CPI of 1.11 & CV% of 9.7%) CV
d. What is most current "Estimate at Completion"? 8. Have any significant changes been made to the baseline during the past fiscal year? 8. If "yes," when was it approved by OMB?
No No
Milestone Number
Description of Milestone
Percent Complete
Actual
09/30/2005 09/30/2005 09/30/2005
Planning - FY05 Acquisition - FY05 O&M FY05 Planning - FY06 Acquisition - FY06 O&M - FY06 Planning - FY07 Acquisition - FY08 O&M - FY07 Planning - FY08 Acquisition - FY08 O&M - FY08 Planning Acquisition - FY09 O&M - FY09 Planning - FY10 Acquisition - FY10 O&M - FY10 Planning - FY11 Acquisition - FY11 O&M - FY11 Planning - FY12 Acquisition- FY12 O&M - FY12 NGI PM Support Internal Requirements Contract Award Hardware Software
2.3 3.1 3.2 3.3 4.1 4.2 5.1 5.2 5.3 6.1 6.2 6.3 7.1 7.2 7.3 7.4 7.6 7.7 8.1 8.2 8.4 8.5 9.1 9.2 9.3 9.4 9.5 10.1 10.2 10.3 11.1 11.2 11.3 11.4 12.1
Services Hardware Software Services NGI PM Support Internal Requirements Hardware Software Travel Hardware Software Services NGI PM Support Internal Requirrements Contract Award Travel IT Security, CM, QA Support Training Hardware Software Training Travel Hardware Software Services Training Travel Hardware Software Services Hardware Software Training Travel Hardware
09/30/2005 09/30/2005 09/30/2005 09/30/2005 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008
$0.000 $0.000 $0.000 $0.000 $1.401 $2.376 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $2.054 $2.372 $0.000 $0.480 $0.648 $0.100 $66.603 $36.808 $0.170 $0.399 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $56.945 $19.789 $0.073 $0.198 $17.696
09/30/2005 09/30/2005 09/30/2005 09/30/2005 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/29/2006 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/28/2007 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008 09/30/2008
$0.000 $0.000 $0.000 $0.000 $1.401 $2.376 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $2.054 $2.372 $0.000 $0.480 $0.648 $0.100 $66.603 $36.808 $0.170 $0.399 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000 $56.945 $19.789 $0.073 $0.198 $17.696
$0.000 $0.000 $0.000 $0.000 $0.975 $1.586 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000
0 $0.000 0 $0.000 0 $0.000 0 $0.000 $0.426 $0.790 $0.000 $0.000 $0.000 $0.000 $0.000 $0.000
100% 100% 100% 100% 67% 67% 100% 100% 100% 100% 100% 100% % % % % % % % % % % % % % % % % % % % % % % %
12.2 12.3 12.4 12.5 13.1 13.2 13.3 14.1 14.2 14.3 14.4 15.1 15.2 15.3 15.4 15.5 16.1 16.2 16.3 17.1 17.2 17.3 17.4 18.1 18.2 18.3 18.4 18.5 19.1 19.2 19.3 20.1 20.2 20.3 21.1 21.2
% % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % % %
21.3 21.4 21.5 22.1 22.2 22.3 23.1 23.2 23.3 24.1 24.2 24.3 24.4 24.5 1.3.1 1.3.2 4.3.2 4.3.3 7.3.3 7.3.3
Project Totals
09/28/2012
09/28/2012 12/19/2005