Preview

Analysis of Fbi's Virtual Case File

Better Essays
Open Document
Open Document
1765 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis of Fbi's Virtual Case File
Table of Contents

1 Project Background 3
2 Project Review 4
3 Reasons for failure 5
4 Alternatives to prevent failure 8
5 Lessons for Management 10
6 References 11 1 Project Background
Virtual Case File (VCF) was a software application developed for the United States Federal Bureau of Investigation (FBI) between 2000 and 2005. It was built to replace the FBI’s old case management system named Automated Case Support (ACS) system. VCF was a third component of FBI’s Trilogy Project. The first component of the Trilogy project was upgrading of software and hardware (computer terminals, servers, printers and servers). The second component part was upgrading of FBI’s network infrastructure. The third component was modernizing the FBI's investigative software applications by creating VCF. Science Applications International Corporation (SAIC) was contracted to design, develop and implement VCF system in 2001. The Trilogy project was originally budgeted for $379.80 million and scheduled to be deployed in 2004 (U.S. Department of Justice, 2005).

The main aim of VCF was to automate the FBI's paper-based systems and processes, allow FBI agents and analysts to obtain important information about cases anywhere in the United States, and to eventually replace the antiquated ACS system (Goldstein, 2005). VCF would also include an evidence management module, a case management module and a records management module. There was no commercial software package available that could meet FBI’s needs in 2001 when the project started, so a custom-developed system solution was required (Marchewka, 2010).

The VCF project failed to meet its initial deadline and was never deployed. It was officially cancelled by the FBI in April 2005 after 4 years of project activity and costing $581 million (Goldstein, 2005; U.S. Department of Justice, 2005).

2 Project Review
The FBI Trilogy project was delayed by almost one year. The two components were successfully completed but



References: Goldstein, H. (2005). Who killed the virtual case file? Spectrum, IEEE, 42(9), 24-35. doi: 10.1109/MSPEC.2005.1502526 Marchewka, J. T. (2010). The FBI Virtual Case File: A Case Study. Communications of the IIMA, 10(2). Mueller, R. S. (2005, 03 February). Testimony. Retrieved 25 May, 2013, from http://www.fbi.gov/news/testimony/fbis-virtual-case-file-system Standish Group. (2009). CHAOS Report: The Standish Group. U.S. Department of Justice. (2005). The Federal Bureau of Investigation’s Management of the Trilogy Information Technology Modernization Project. Office of the Inspector General Audit Division.

You May Also Find These Documents Helpful

  • Powerful Essays

    The Federation Square project had a very aggressive schedule in order to be complete by the…

    • 1250 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    The events of September 11th, 2001 have had a larger impact on the United States Intelligence Community than any single event in its history. It forced the U.S. Intelligence community to look critically at their policies, organization, and how they handled business. The Joint Inquiry, 9/11 Commission, and Inspectors General found numerous deficiencies in communication, technological capabilities, and limited oversight. The government responded to these gaps through creation of legislation, implementation of regulations, a massive restructuring of the intelligence community, and utilization of new technologies.…

    • 1813 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    fbi cases

    • 3323 Words
    • 14 Pages

    Details of the two-year FBI investigation called Operation Ghost Click were announced today in New York when a federal indictment was unsealed. Officials also described their efforts to make sure infected users’ Internet access would not be disrupted as a result of the operation.…

    • 3323 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    There was significant misunderstanding of the complexity of this project. Not having a sufficient timeline and accurate planning of all tasks allowed room for the project to go over the timeline because there was no planning for testing and failures. In addition, staff working more than one project at a time and not being solely dedicated showed initiative…

    • 476 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Louis J. Freeh was appointed Director of the FBI in September 1993. During his office, the FBI increased its efforts against white-collar crime, organized crime, terrorism and also expanded the agency to 21 foreign offices. With the introduction of the internet into households, the FBI had to create another division to control cyber crime. It created the Computers Investigations and Infrastructure Threat Assessment Center (CITAC). Between 1993 and 2001 the FBI's budget grew by ore than $1.27…

    • 1778 Words
    • 8 Pages
    Good Essays
  • Better Essays

    Policing Functions Paper

    • 1069 Words
    • 5 Pages

    The Federal Bureau of Investigation (N.D.) Ten years after the FBI since 9/11. Retrieved July…

    • 1069 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    In today’s business world the security and privacy of employee files, business trade secrets and proprietary information has became an increased problem. The information is being compromised and/or stolen from within the business environment itself. The files are not protected from unauthorized individuals. These files can be protected using various methods, such as individual user accounts or profiles, storing paper files in a secured area as well as, improved electronic data storage.…

    • 962 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Sullivan, Scott. "Policing the Internet." The FBI Law Enforcement Bulletin. June 1999. Expanded Academic Index. February 25, 2001.…

    • 1159 Words
    • 5 Pages
    Better Essays
  • Better Essays

    There are many departments both inside and outside the criminal justice system that relies greatly on the use of advanced technology, as it appears to be a big help in many areas of the professional field, some of which includes Medical Services, fire departments, and law enforcement agencies. On the whole, all these agencies and more now rely on information and communication for their tasks to be effective and advance technology has certainly has necessitated true production and efficiency. Before the new discovery of advance technology, information was (and still is) documented on paper and stockpiled in boxes or filing cabinets. Now all it takes are a few click of a button to pull this information in a much faster way with computer systems. Information can now be retained from building structures a few feet away on a department computer, or even miles and many miles away from a remote computer location using a computer networking system. As fast as this information can be retained, is also can be disbursed at a rapid rate throughout the law…

    • 1519 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Digital Crime

    • 542 Words
    • 3 Pages

    The purpose of this paper is to explain the existing challenges that result from the independent nature of federal agencies, as well as the other factors that are common to each of them and discuss how the U.S. could align these efforts to better protect the nation against digital crimes and terrorism.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    References: * Hamblen, M., Thibodeau, P., Ramel, D., & Lamont, I. (March, 2008). IT deputized to help take a bite out of crime. ComputerWorld. Retrieved from the University of Phoenix Online.…

    • 1268 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Bella Healthcare India

    • 551 Words
    • 2 Pages

    3. The project was far behind the schedule, causing heavy cash burden on the company.…

    • 551 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    10. There was a lack of governance structure or escalation procedures - Reinhardt’s first opportunity to escalate was six months into the project – only once it was behind schedule and over budget.…

    • 1618 Words
    • 7 Pages
    Better Essays