Preview

The Fbi Virtual Case File

Better Essays
Open Document
Open Document
1369 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Fbi Virtual Case File
| The FBI Virtual Case File | IS 430 - Fundamentals of IT Project Management | | |

|

Table of Contents

Summary2
How I researched the case3
Case Discussion3
What I have learned in this case study5
Works Cited7

Summary
The Virtual Case File (VCF) from the Federal Bureau Investigation (FBI) was a failed technology project that cost the United States Government over $170 million dollars including $105 million worth in unusable code. The FBI desperately needed an upgrade to their IT infrastructure which it is in three stages. The FBI needed to install about 30,000 desktop computers; creating a high speed Local Area Network (LAN) and Wide Area Network (WAN) to connect to all of the desktop computers, and implement a VCF. The system would allow FBI agents to share information across the world among themselves and other law enforcement agencies.
In the year 2005, the VCF project was abandoned. The project has successfully completed the first two stages and it had reasonable goals. By completing the first two goals, it was still considered a failure. The FBI’s Chief Information Officer (CIO) Zalmai Azmi, blamed the corporate culture and the distrust of the FBI’s technology as a reason behind of the misalignment. By having the FBI do a further investigation, the FBI had other problems in the VCF. They had problems such as specification problems, constant changes, a lack of an IT department, and a poor turnover among management.
Robert Mueller implemented a new program called the Sentinel. The Sentinel is a four-phase, four-year project intended to do the VCF 's job and provide the bureau with a Web-based case- and records management system that incorporates commercial off-the-shelf software. By using this system, this will have better communication between the users and developers. This development will change the FBI agents’ attitude towards technology before they introduce the new system.

How I researched the case
I researched this case



Cited: n.d. 17 January 2011 <http://www.usnews.com/usnews/news/articles/050607/7committee.pdf>. FBI - FBI Virtual Case System. 3 February 2005. 19 January 2011 <http://www.fbi.gov/news/testimony/fbis-virtual-case-file-system>. Ragavan, Chitra. FBI 's troubled case-file costs soar. 7 June 2005. 15 January 2011 <http://www.usnews.com/usnews/news/articles/050607/7justice_2.htm>. —. FBI 's troubled case-file costs soar. 7 June 2005. 15 January 2011 <http://www.usnews.com/usnews/news/articles/050607/7justice.htm>.

You May Also Find These Documents Helpful

  • Better Essays

    Search and Seizure

    • 1445 Words
    • 6 Pages

    References: Hendrie, Edward M. // FBI Law Enforcement Bulletin; Sep97, Vol. 66 Issue 9, p26…

    • 1445 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Bringing Adam Home Analysis

    • 2378 Words
    • 10 Pages

    Anytime a question of jurisdiction is involved, it is important for agencies to work together and share information to solve the case. It is not uncommon for the Federal investigators to get involved in child abduction cases. In this particular case, Florida senator Paula Hawkins tried to get the FBI involved in the search for Adam Walsh. The FBI was reluctant to interfere in the case however. If Hollywood PD was searching for a suspect somewhere out of state then the feds would be more than happy to lend a hand (Standiford & Matthews, 2011, p. 149). In 1988, FBI Deputy Director Alan Burgess advised that the Adam Walsh case had entered into the new nationwide database known as VICAP, the Violent Crime Apprehension Program. The FBI-VICAP became the national repository for violent crimes, collating data on homicides, sexual assaults, missing persons, and unidentified human remains (Standiford & Matthews, 2011, p. 164). In 1988, the Walsh family received a letter from Toole confessing to the crime and trying to extort money in exchange for the location of Adam Walsh’s bones. The letter was given to Detective Hoffman and he filed the letter away citing a lack of physical evidence. Several years later, when the Walsh Family spoke to the Michael Satz at the State Attorney’s Office, he advised that he was not aware of the letter. The book demonstrated Detective Hoffman’s failure to share information based…

    • 2378 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    fbi cases

    • 3323 Words
    • 14 Pages

    The indictment, said Janice Fedarcyk, assistant director in charge of our New York office, “describes an intricate international conspiracy conceived and carried out by sophisticated criminals.” She added, “The harm inflicted by the defendants was not merely a matter of reaping illegitimate income.”…

    • 3323 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Cmgt410 Project Budget

    • 363 Words
    • 2 Pages

    References: Marchewka, J. T. (2012). Information Technology Project Management (4th ed.). Retrieved from The University of Phoenix eBook.…

    • 363 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Pettrey, J.D., M. T. (2012, March). FBI ? The Exigent Circumstances Exception After Kentucky v. King. Retrieved July 15, 2013, from http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/march-2012/the-exigent-circumstances-exception-after-kentucky-v.-king…

    • 866 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    |1 |Identify the principal issue presented by the |the requirement for investigation and prosecution of the computer network |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Security Organization Provides information on the structure of the information security organization and individuals that fulfill the information security role Scope  This Information Security Policy applies to the City of Chicago, its departments, commissions, boards, offices, and agencies, and all officers, employees, temporary employees, interns, vendors, consultants, contractors and agents thereof--collectively referred to as ―User(s)‖. The principles set forth in this Policy are applicable to all information technology and assets, in all…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Federal Bureau of Investigation. (2006, February 17). Violent crime. Retrieved on 12 May 2006 from http://www.fbi.gov/ucr/cius_04/offenses_reported/violent_crime/index.html…

    • 3693 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    The portfolio of the lead agent goes to Sam as he has 12 years experience with the FBI. Sam is currently working in Arizona as a special agent. He has experience in national drug regulation, fluent in Spanish and spent time in Southern America. The appointment of Sam to this portfolio is a crucial step because he spent time in the region, which is a departure point of drugs to the United States. Sam has further experience as a lead agent acquired over four assignments. An unassuming man but goes out when he believes it necessary, Sam’s persona is a good characteristic of the final gatekeeper whose job will include safe guarding top secrets of the special task force.…

    • 1285 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    A good case example to showcase US actions in virtual warfare took place in 2014 with the alleged hacks by North Korea on the US companies Sony Pictures. Although not committed on the US government directly, the 2014 Sony Hack represents an indirect virtual attack on US interests. This episode of virtual conflict is one of many that the US has played a part in. An offensive example showcasing the US’s alleged engagement in virtual attacks against Iranian Nuclear facilities with the military grade Stuxnet virus. Stuxnet had much more serious political implications, but the Sony Pictures Attack serves to exhibit how the US is limited in its available responses to certain virtual attacks, from the high threshold it sets based on its allegiance to international law. Other states that do not share the same perception take advantage…

    • 1738 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The FBI

    • 472 Words
    • 2 Pages

    Being an FBI agent is a difficult task, and grueling occupation, but yet it is respected and can help and protect all people. Not just anyone can become an FBI agent; it takes a lot of hard work, skill, and dedication to accomplish this goal and be able to do this job. The FBI addresses and investigates major crimes where the fugitive has crossed state borders or fled the jurisdiction in the United States. Attorney General Bonaparte first started the FBI in 1908 during the time Theodore Roosevelt was president. When first opened, the FBI actually had no name and was just known as a “special agent force.” The future of what is known today as the FBI was the direct result of the Interstate Commerce Act of 1887. Progressive was given to the department of justice by creating special agent’s corps and law enforcement was often called a political rather than a professional. During the early period of the FBI’s history, its agents investigated violations of mainly bankruptcy frauds, antitrust crime, and neutrality violation. Also during World War I, the Bureau was given the responsibility of investigating espionage, sabotage, sedition, and draft violations.…

    • 472 Words
    • 2 Pages
    Good Essays
  • Better Essays

    In present-day, technology has been established to be tremendously essential and efficient, and has been embedded in our lives currently to the point of being close to a necessity. In Criminal Justice, the ardent use of technology has proven to be of tremendous help in many areas of the field. The incorporation of the computer systems in criminal justice tremendously has improved the general communication between agencies as the new methods of transferring information among departments. In addition, it has become much more resourceful and efficient in that it is much simpler to acquire the data at a more rapid rate, hence, speeding up the time it takes to prevent or solve crimes. The intent of this paper is to deliver an insight toward the efficiency of the methods in which technology was being used inside the criminal justice system.…

    • 1519 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Uniform Crime Report (FBI)

    • 5472 Words
    • 15 Pages

    Uniform Crime ReportOften people wonder how do we know so much about certain types of crimes and what their impact is on society. The Uniform Crime Report put out by the FBI every year, has two major categories that does not cover all crimes but does give us statistics on the crimes that are committed in each of these categories. The Uniform Crime Report has two major categories, which include Violent personal crimes and Property crimes. Each category has four crimes that are related to that category. Violent personal crimes consist of the following; Murder/Manslaughter, Aggravated Assault, Rape, and Robbery. The next category is the Property crimes, which consist of Burglary, Larceny/Theft, Motor Vehicle Theft, and Arson. For each crime there are statistics such as clearance rates for each crimes. The FBI also needs to know which crime is the most reported and which crime happens the most often. The FBI gathers information from people to see what kind of crimes have happened in their area. Then when all the information is gathered from the public they move to the police stations to see what kinds of numbers they have for that year. They want to see if the numbers that the police have in their books co inside with the numbers that they have received from the public. When all of that information has been gathered they use it to form the Uniform Crime Report to see what crimes have made an increase or a decrease though out the year.…

    • 5472 Words
    • 15 Pages
    Better Essays
  • Satisfactory Essays

    Hanley Strappman, 37, was trying to learn about the Computer and Digital Forensics program at Champlain College. He was able to obtain some files, which he put on a floppy disk. To disguise his espionage, he decided to smuggle the floppy back home after altering the files so that they couldn't be read using the ordinary DOS/Windows file manager.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays