Preview

Analysis of Fbi's Virtual Case File

Better Essays
Open Document
Open Document
1765 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis of Fbi's Virtual Case File
Table of Contents

1 Project Background 3
2 Project Review 4
3 Reasons for failure 5
4 Alternatives to prevent failure 8
5 Lessons for Management 10
6 References 11 1 Project Background
Virtual Case File (VCF) was a software application developed for the United States Federal Bureau of Investigation (FBI) between 2000 and 2005. It was built to replace the FBI’s old case management system named Automated Case Support (ACS) system. VCF was a third component of FBI’s Trilogy Project. The first component of the Trilogy project was upgrading of software and hardware (computer terminals, servers, printers and servers). The second component part was upgrading of FBI’s network infrastructure. The third component was modernizing the FBI's investigative software applications by creating VCF. Science Applications International Corporation (SAIC) was contracted to design, develop and implement VCF system in 2001. The Trilogy project was originally budgeted for $379.80 million and scheduled to be deployed in 2004 (U.S. Department of Justice, 2005).

The main aim of VCF was to automate the FBI's paper-based systems and processes, allow FBI agents and analysts to obtain important information about cases anywhere in the United States, and to eventually replace the antiquated ACS system (Goldstein, 2005). VCF would also include an evidence management module, a case management module and a records management module. There was no commercial software package available that could meet FBI’s needs in 2001 when the project started, so a custom-developed system solution was required (Marchewka, 2010).

The VCF project failed to meet its initial deadline and was never deployed. It was officially cancelled by the FBI in April 2005 after 4 years of project activity and costing $581 million (Goldstein, 2005; U.S. Department of Justice, 2005).

2 Project Review
The FBI Trilogy project was delayed by almost one year. The two components were successfully completed but



References: Goldstein, H. (2005). Who killed the virtual case file? Spectrum, IEEE, 42(9), 24-35. doi: 10.1109/MSPEC.2005.1502526 Marchewka, J. T. (2010). The FBI Virtual Case File: A Case Study. Communications of the IIMA, 10(2). Mueller, R. S. (2005, 03 February). Testimony. Retrieved 25 May, 2013, from http://www.fbi.gov/news/testimony/fbis-virtual-case-file-system Standish Group. (2009). CHAOS Report: The Standish Group. U.S. Department of Justice. (2005). The Federal Bureau of Investigation’s Management of the Trilogy Information Technology Modernization Project. Office of the Inspector General Audit Division.

You May Also Find These Documents Helpful

  • Powerful Essays

    The Federation Square project had a very aggressive schedule in order to be complete by the…

    • 1250 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    fbi cases

    • 3323 Words
    • 14 Pages

    Details of the two-year FBI investigation called Operation Ghost Click were announced today in New York when a federal indictment was unsealed. Officials also described their efforts to make sure infected users’ Internet access would not be disrupted as a result of the operation.…

    • 3323 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    There was significant misunderstanding of the complexity of this project. Not having a sufficient timeline and accurate planning of all tasks allowed room for the project to go over the timeline because there was no planning for testing and failures. In addition, staff working more than one project at a time and not being solely dedicated showed initiative…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    2. Decker, S., Cordner, G., Ward, S. (1999). Case Study: San Diego, California Police Department - Information Systems Technology Enhancement Project. http://www.abtassoc.com/reports/ISTEP_C3.pdf…

    • 2691 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Erp Implementation

    • 8034 Words
    • 33 Pages

    701 E. Chocolate Avenue, Hershey PA 17033-1240, USA Journal of Cases on Information Technology, 11(2), 42-55, April-June 2009 Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.igi-global.com…

    • 8034 Words
    • 33 Pages
    Powerful Essays
  • Good Essays

    The Federal Bureau Of Investigations labratory has been around since November 24,1932. Back then it was only a single agent in a single room with some basic equipment. Flash forward to today and it is one the largest and most state of the art facilities in the world. The FBI has 56 field offices throughout the U.S. Their main labratory is located in Quantico, VA. The lab is comprised of five sections each with varying numbers of sub-sections. The provide an array of services anyhting from maintaining a tire tread database to examination of improvised explosive devices (IEDS) from the battlefield in Afghanistan. Many of the units are deployable to anywhere in the world and almost all departments provide courtroom testimony. All departments work with federal , state, local and some inter-national law enforcement organizations. The lab is accredited by the American Society of Crime Labratory Directors/Labratory Accreditation Board. (see attached print out for credentials)…

    • 1109 Words
    • 5 Pages
    Good Essays
  • Better Essays

    In today’s business world the security and privacy of employee files, business trade secrets and proprietary information has became an increased problem. The information is being compromised and/or stolen from within the business environment itself. The files are not protected from unauthorized individuals. These files can be protected using various methods, such as individual user accounts or profiles, storing paper files in a secured area as well as, improved electronic data storage.…

    • 962 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Better Essays

    There are many departments both inside and outside the criminal justice system that relies greatly on the use of advanced technology, as it appears to be a big help in many areas of the professional field, some of which includes Medical Services, fire departments, and law enforcement agencies. On the whole, all these agencies and more now rely on information and communication for their tasks to be effective and advance technology has certainly has necessitated true production and efficiency. Before the new discovery of advance technology, information was (and still is) documented on paper and stockpiled in boxes or filing cabinets. Now all it takes are a few click of a button to pull this information in a much faster way with computer systems. Information can now be retained from building structures a few feet away on a department computer, or even miles and many miles away from a remote computer location using a computer networking system. As fast as this information can be retained, is also can be disbursed at a rapid rate throughout the law…

    • 1519 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Digital Crime

    • 542 Words
    • 3 Pages

    The National Security Agency (NSA) aims to use social media and improved data sharing as part of an enhanced strategy to fight organized crime in the United States and abroad. The White House has launched the Strategy to Combat Transnational Organized Crime to step up its efforts to fight this type of crime by better integrating diverse work from various agencies that collect intelligence data and track and investigate these types of criminals. The new plan is the result of a year-long study of the current state of these types of crimes, the most comprehensive of its kind in 15 years. The feds in general have been working across various agencies that are responsible for crime investigations and the protection of the general public--such as the FBI, Department of Homeland Security, and the Department of Defense--to better share information. Often agencies with different responsibilities for investigation don 't communicate effectively with each other, a problem the federal government has been trying to remedy through the use of technology.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    References: * Hamblen, M., Thibodeau, P., Ramel, D., & Lamont, I. (March, 2008). IT deputized to help take a bite out of crime. ComputerWorld. Retrieved from the University of Phoenix Online.…

    • 1268 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    10. There was a lack of governance structure or escalation procedures - Reinhardt’s first opportunity to escalate was six months into the project – only once it was behind schedule and over budget.…

    • 1618 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Bella Healthcare India

    • 551 Words
    • 2 Pages

    3. The project was far behind the schedule, causing heavy cash burden on the company.…

    • 551 Words
    • 2 Pages
    Satisfactory Essays