Upload
dasmith100
View
219
Download
0
Embed Size (px)
DESCRIPTION
L-3 ASA are a pioneering systems engineering company with core capabilities in thedevelopment and full life-cycle management of complex systems which include informationmanagement and intelligence systems, data-fusion, watch-listing & watch-list systems,command and control and mission-critical configurable communications.
Citation preview
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page i
Table of Contents
1.0 Introduction .................................................................................................................................. 1
2.0 Biometric/Border Security Advice and Guidance ........................................................................ 3
2.1 Description ............................................................................................................................... 3
2.2 Characteristics .......................................................................................................................... 4
2.3 Our Approach ........................................................................................................................... 5
2.4 Your Results ............................................................................................................................. 7
3.0 Contact .......................................................................................................................................... 8
4.0 Why L-3 ASA............................................................................................................................... 9
5.0 Other Key Points ........................................................................................................................ 10
5.1 Information Assurance ........................................................................................................... 10
5.2 Backup/Restore and Disaster Recovery .................................................................................. 10
5.3 On-Boarding and Off-Boarding .............................................................................................. 10
5.4 Pricing ..................................................................................................................................... 10
5.5 Service Management Details .................................................................................................. 10
5.6 Service Constraints ................................................................................................................. 10
5.7 Service Levels......................................................................................................................... 10
5.8 Financial Recompense Model ................................................................................................ 11
5.9 Training and Knowledge Transfer .......................................................................................... 11
5.10 Ordering and Invoicing Process ............................................................................................. 11
5.11 Termination Terms ................................................................................................................. 11
5.12 Data Restoration / Service Migration ..................................................................................... 11
5.13 Customer Responsibilities ...................................................................................................... 11
5.14 Technical Requirements ......................................................................................................... 11
5.15 Trial Services .......................................................................................................................... 11
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 1
1.0 INTRODUCTION
L-3 ASA are a pioneering systems engineering company with core capabilities in the
development and full life-cycle management of complex systems which include information
management and intelligence systems, data-fusion, watch-listing & watch-list systems,
command and control and mission-critical configurable communications.
We provide a broad range of services with applicability to cloud-based systems, using our in-
house engineering and management expertise. Backed by the depth and expertise of our
parent company, L-3, we offer advanced solutions in cyber operations, intelligence
operations, enterprise IT, and operational infrastructure. Key capabilities include specialised
applications for border security, border protection, biometric services, intelligence
management, workflow and case management, situational awareness and secure
communications services in law enforcement, border security, defence and commercial
environments.
In the UK, L-3 ASA have a well-established presence in the following sectors:
Defence
Communications
Intelligence
Transportation
In each sector, we supply expertise across the following areas:
Information Strategy
Advice and Guidance
Technical Strategy and Planning
Business Change Management
Systems Development
Installation and Integration
Service Design
Service Transition
Service Operation
Quality and Conformance
In the defence and communications sectors, we have supplied and supported robust high
availability systems for deployment in complex and challenging environments for more than
25 years.
In the intelligence sector, we have a rich history of enabling UK law enforcement agencies to
analyse and disseminate highly sensitive information. Our services provide the means to
ingest, analyse and disseminate both structured and unstructured data relating to criminal
threats within the UK and from across its borders, and are at the heart of the fight against
organised crime in the UK and internationally.
In the rail and air transportation sectors, our flexible Agile approach to system design and
delivery focuses on strategy, requirements definition, system engineering, content
management and software development.
L-3 ASA are based at a List X site in Hampshire, where we maintain workstations for
performing system design, development and testing. Our workshop facilities include
development and integration laboratory areas, as well as protected secure enclaves for high
classification work. We also conduct customer training at our facilities, which have access to
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 2
appropriate hardware and reference equipment for fielded systems that we maintain to
support post-deployment activities.
All L-3 ASA staff are subject to HMG Baseline Personnel Security Standard and higher
levels of security clearance are obtained as necessary via the MOD DBS National Security
Vetting System. Staff security obligations are met through employee contracts of service and
with Non Disclosure Agreements for subcontractors and third parties. The Official Secrets
Act also applies to all staff, subcontractors and third parties as necessary.
We hold a number of key industry accreditations and certifications including ISO9001 and
TickIT registrations. Relevant endorsements are continuously being identified and achieved.
Through L-3, our parent company, L-3 ASA also have access to other facilities and
capabilities within the UK, namely: L-3 Security and Detection Systems (scanners and
detection systems), L-3 TRL Technologies (secure communications), L-3 Marine Services
(integrated command and communications), L-3 Link Simulation (simulators and training
services).
Overall, L-3 have a culture which encourages innovation and an open and user-focused
approach. Key strengths include the ability to migrate and integrate technology to meet
increasingly complex and visionary customer objectives. Therefore, our companies are able
to provide services across new domains (including those unrelated to the domains listed
above), and are ideally placed to exploit emerging cloud-based technologies.
The linkage between L-3 ASA and L-3 also enhances use of modern, industry standards,
methodologies and best practices to support delivery of services. Both iterative and Agile
methods are employed in software development. Use of appropriate methods across all
aspects of service delivery ensures both efficiency and quality are maximised. L-3’s working
practices allow rapid deployment and integration of services, which is a key requirement for
cloud-based systems. Technical expertise spans the software development lifecycle and
regular training (either in-house or external) enables staff to keep their skills up-to-date with
the latest technologies and methodologies.
In addition, our L-3 parent brings significant expertise in border management and
immigration services (including use of biometrically-enhanced security measures). This has
been demonstrated during the U.S. Visitor and Immigrant Status Indicator Technology (US-
VISIT) Program, a major programme with the US Government’s Department of Homeland
Security. The company also has experts in cloud-based systems, who devise innovative,
secure and cost-effective cloud solutions.
With the expertise and agility to meet time-critical operational requirements and with a
proven record of assured delivery, L-3 ASA are ideally placed to respond to the most
demanding challenges of the information age, including the increasing adoption of cloud-
based systems.
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 3
2.0 BIOMETRIC/BORDER SECURITY ADVICE AND GUIDANCE
L-3 ASA provide a full spectrum of IT lifecycle support including all aspects of designing,
developing, managing, and maintaining customer Information Technology (IT) systems.
Backed by the depth and expertise of our parent company, L-3, we offer advanced solutions
in cyber operations, intelligence operations, enterprise IT, and operational infrastructure. Key
capabilities include specialised applications for border security, border protection, biometric
services, intelligence management, workflow and case management, situational awareness
and secure communications services in law enforcement, border security, defence and
commercial environments.
Our Biometrics/Border Security Advice and Guidance services leverage our core capabilities
in the development and full life-cycle management of complex systems which include
information management and intelligence systems, data-fusion, watch-listing and watch-list
systems, data profiling, data mining, command and control and mission-critical configurable
communications. Our experience includes biographic and biometric data integration,
biometric system integration, business strategy development, data modelling and analysis,
software development, stakeholder management, object-oriented design, ad-hoc reporting,
requirements definition and analysis, and project management. Based on our capabilities and
experience, we provide advice and guidance on:
Service oriented architecture implementation – We provide service standardisation,
policies and governance for border protection
Biometric systems integration – We specialise in performing biometric systems
integration in a high availability environment with strong experience in immigration
and border management
Biometric suitability analysis and consultancy – We offer consultation, strategy,
analysis, implementation, and testing to evaluate the suitability of different biometric
modes in multiple border management scenarios
System performance analysis – We perform capacity and throughput analysis and
recommend technical approaches to increase system capacity when appropriate
Border security database architecture – We design, develop and deploy Online
Transaction Processing (OLTP) and data-warehouse databases used in border security
operations
System security – We provide IT security support to system development teams by
assessing proposed system modifications to ensure operating systems are secured in
accordance with IT security directives
We understand the unique challenges of border management and immigration systems and
can bridge the communication gap between operations and technology customers.
2.1 DESCRIPTION
Our Biometrics/Border Security Advice and Guidance services leverage our core capabilities
in the development and full life-cycle management of complex systems. Based on our
capabilities and experience, we provide advice and guidance on:
Service Oriented Architecture (SOA) definition and implementation
Web based applications and systems
Biometric system design/implementation and independent Evaluation
E-gates specification and on-going assessment and performance analysis
Independent Biometric system Testing
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 4
Biometric suitability analysis and consultancy
Identity Management and Biometric data integration and sharing
L-3’s past customers include the UK Border Agency, the UK Border Force, the UK Passport
Agency (now IPS), and the US Department of Homeland Security (DHS). Our consultants
understand the unique challenges of border management and immigration systems and can
bridge the communication gap between operations and technology customers. L-3 consultants
are able to communicate at a conceptual level as well as at a technical detail level; they can
simplify and explain ideas and technology to people with a varying degree of technical
knowledge. Our staff provides thought leadership, innovation, and technical management to
customers requiring highly available, highly visible solutions. L-3 personnel guide strategic
decisions, create architectural roadmaps, and lead the implementation of solutions from
planning to operations.
Our core capabilities include biographic and biometric data integration, biometric system
integration, business strategy development, data modelling and analysis, software
development, stakeholder management, object-oriented design, ad-hoc reporting,
requirements definition and analysis, and project management.
Service Oriented Architecture: We design service oriented architectures to migrate tightly
coupled, vertically integrated and loosely controlled systems to a disaggregated, loosely
coupled and tightly controlled solution.
Web based applications and systems: L-3 provide Technical Leads with experience in the
design, development and implementation of web based applications and services. Our
personnel have expertise in the methodologies, technologies and interfaces relevant to web
enabled services and have experience in their deployment across the military, law
enforcement and commercial sectors. L-3 have implemented these technologies within a
service oriented architecture interfacing to existing and legacy systems. Our staff have
experience in the development of browser based interfaces for use on mobile devices as well
as desk top provision in a command and control environment.
Biometric System Integration: L-3 personnel have extensive experience creating and
integrating biometric systems in a high availability environment coupled with strong
understanding of immigration and border management. Our team’s knowledge includes
watch-list management and accuracy analysis to maximise performance of the identity
management solution.
Biometric suitability analysis and consultancy: L-3 consultants provide strategy, analysis,
and suitability of different biometric modes within operational environments.
System Performance Analysis: We define, collect, and monitor metrics to ensure system
performance meets Service Level Agreements.
Border Security Database Architecture: We design, develop and deploy Online
Transaction Processing (OLTP) and data-warehouse databases used in border security
operations.
System security: We provide IT security support to system development teams by assessing
proposed system modifications to ensure operating systems are secured in accordance with IT
security directives.
2.2 CHARACTERISTICS
Our biometric and border management consultancy service leverages our extensive
experience and provides robust solutions through the use of:
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 5
Business Process Modelling (BPM)
Client services management
Business development support
Strategic management and control
Strategic direction
Technical leadership
Organisational leadership
Data governance and stewardship
Watch-list management
Data profiling and mining
Data interoperability and sharing via standards and policies
SOA governance
SOA system integration in a highly available, high volume environment
Data warehouse establishment
Biometric identification security
Biographic matching integration
False Acceptance Rate (FAR) and False Rejection Rate (FRR) analysis
2.3 OUR APPROACH
L-3 leverage our extensive team to provide technical specialism based the customer’s needs.
This specialism ranges from high level strategy and conceptual architectures to specialised
software engineers, testers, and database administrators. We will work with your organisation
to determine the correct makeup of our team in order to meet your needs.
Service Oriented Architecture
L-3 consultants design service oriented architectures (SOA), along with accompanying
technical specifications describing every service, message, and data element, to provide
biometric identification and verification services to external stakeholders.
Border management often requires highly available, high volume systems. Border
Management and immigration systems need to vet each traveler thoroughly while preventing
long lines of travelers at the port of entry. L-3 consultants design and develop SOA systems
that meet these operational requirements. In addition, we provide a roadmap to apply a
phased approach to transitioning to a SOA system in a low risk manner. L-3 architects have
experience creating message standards to simplify interoperability among systems.
Our engineers develop canonical data models and governance to ease the integration of
legacy systems to conform to a common standard. Our architects maintain detailed reference
architecture diagrams for the current reference architecture and future state architecture. L-3
consultants define and develop architecture building blocks and guide the implementation of
the future state architecture. Our staff align business processes and data flows to the technical
strategy by leading cross-functional teams to ensure that operational requirements are met,
and the solution maximises value for money.
Our Solution Architects review software designs and collaborate with project managers and
technical leads to verify designs meet technical and architectural standards for the program.
Biometrics System Integration
L-3 provide solutions-oriented Technical Leads focused on large scale biometric information
systems. Our personnel have extensive experience performing system integration in a high
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 6
availability environment coupled with strong experience in immigration and border
management. Our team can predict and advise business requirements, processes, applications
and systems that can be developed for future business improvement, including modularisation
to reap the rewards of cloud and G-cloud based technology, PaaS, IaaS and SaaS. L-3 has
expertise integrating workflow engines, managing watch-lists, implementing business rules,
and developing identity management solutions. We also have experience redirecting off-
course, expensive projects toward more strategic, less risky, and less expensive solutions.
Biometric suitability analysis and consultancy
L-3 staff also performed consultation, strategy, analysis, implementation, and testing to
evaluate the suitability of different biometric modes in multiple border management
scenarios. L-3 consultants made recommendations on the applicability of different biometric
modes including hand geometry, iris, facial recognition (2D and 3D), and vein recognition.
L-3 engineers integrated fingerprint, iris, palm, and facial capture devices into kiosks and
hand-held devices. In addition, L-3 analysts assessed the use of biometric capture devices
within an e-Gate border management solution. We performed extensive testing of these
devices and evaluated the usability, performance, and accuracy of devices based on the
subject’s age, ethnicity, and disability.
System Performance Analysis
L-3 ensure mission-critical applications remain operational and meet service level
agreements. We perform ad-hoc data analysis and reporting for business owners and guide
modelling and simulation teams in designing system models that accurately capture system
performance and throughput. We then recommend technical approaches to increase system
capacity when appropriate.
Border Security Database Architecture
L-3 develop logical and physical data models for Online Transaction Processing (OLTP) and
data-warehouse databases used in border security operations. We design and develop
Informatica processing for data-warehouse Extract, Transform, Load (ETL) processing and
provide Backup and Recovery best-practices overviews for production databases (400+
terabyte [TB] databases). We also have experience conducting trade studies for biometric
image separation with prototyped solutions (billions of biometric images). L-3 Database
Architects design and develop data archive strategies for transactional data and large scale
Programming Language (PL)/Structured Query Language (SQL) packages for ETL
processing, data conversions and migrations. We also document standards and approaches for
data-warehousing for ETL processes.
System Security
L-3 Security Architects provide IT security support to system development teams by
assessing proposed system modifications to ensure operating systems are secured in
accordance with IT security directives. We also have extensive experience coordinating with
United States agencies on security requirements for sharing sensitive data and documenting
those security controls in Interconnection Security Agreements (ISA). L-3 coordinates
firewall rules with development teams and Security Operations Centers to allow biometric
identification systems to connect to other IT systems. We develop and implement processes
for controlling access to systems’ production, development, and test servers and databases
and assist with Incident Response Teams by coordinating the identification of the incident
cause, ensuring it is resolved, and implementing remedial actions.
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 7
2.4 YOUR RESULTS
L-3 delivers expertise for border security and biometric IT operations – the output of our
analyses are tailored to the customer’s requirements.
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 8
3.0 CONTACT
Business Development
L-3 Communications ASA Ltd
Rusint House
Harvest Crescent
Fleet
Hampshire
GU51 2QS
Tel: 01252 775700
email: [email protected]
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 9
4.0 WHY L-3 ASA
Our technical credentials and 20+ years’ experience of developing custom applications
with vendor independence with our best of breed COTS partners set us apart as the
partner of choice in advising on how to take full advantage of today’s emerging
markets and cloud/web based computing technology.
Our extensive experience of successfully delivering complex IT systems and services
covering border security, border protection and biometrics, high grade intelligence
management, workflow and case management, and secure communications. Working in
the most demanding environments where mistakes have severe consequences where we
pride ourselves in delivering mission critical systems that provide mission critical data.
Our experience in managing complex environments to provide services for both on-
premise and cloud-based business models.
Agility and innovation are our key performance drivers and trademarks of the solutions
and services we deliver.
The risks associated with web and cloud based environments play to our core areas of
strength: security, integrity, reliability, compliance and integration.
Our proven track record of delivering highly secure solutions means we are best placed
to address any security or privacy issues regarding adoption of software services.
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 10
5.0 OTHER KEY POINTS
5.1 INFORMATION ASSURANCE
The services described in this document are not eligible for information assurance
accreditation as defined in HMG IA Standard No. 1 – Technical Risk Assessment (IS1). No
IS027001 certifications apply to the services.
L-3 ASA is a List X company accredited up to UK SECRET with CESG qualified
cryptographic custodians. It is also recognised by L-3 ASA that due to the nature of the end
users, its personnel may be required to attend environments of high protective marking, and
there are a number of staff already cleared to highest security levels.
5.2 BACKUP/RESTORE AND DISASTER RECOVERY
L-3 ASA’s systems and development environments are all regularly backed up and managed
to ensure no loss of effort takes place and a comprehensive disaster recovery plan is in place.
Any data held is handled in compliance to the latest UK Security Policy Framework.
It should be noted that these considerations are not relevant to all the services listed. Where
applicable L-3 ASA will provide advice and support for implementation and maintenance of
suitable backup/restore and disaster recovery procedures at customer sites where cloud
services are hosted.
5.3 ON-BOARDING AND OFF-BOARDING
This will not be applicable to all of the services offered. Where on-boarding and off-boarding
are applicable, L-3 ASA will identify the relevant issues and requirements early in the
process of delivering the service, and will supply the customer with the required level of
advice and support. This will cover areas such as:
Data migration
Connecting/disconnecting databases, systems and applications within cloud services
Security continuity
5.4 PRICING
The pricing for the services is detailed in the pricing document and the SFIA rate card
supplied as supporting documentation within the G-Cloud 4 framework.
5.5 SERVICE MANAGEMENT DETAILS
All relevant service management details will be included in line with the agreed requirements
and scope of the service. L-3 ASA’s standard Service Management model provides for a
three tier service management offering but these can be tailored to meet any customer’s
requirements.
5.6 SERVICE CONSTRAINTS
All relevant service constraints will be clarified with the customer before a service is
supplied. The constraints will be defined in terms of the agreed requirements and scope of the
service. Service constraints will not apply to all services.
5.7 SERVICE LEVELS
A full service management arrangement will be produced within which all service levels for
the service agreement will be defined and detailed. Our standard Service Management model
provides for a three tier service level management offering but these can be tailored to meet
any client’s requirements.
G-Cloud 4 L-3 ASA Biometric/Border Security Advice and Guidance
Page 11
5.8 FINANCIAL RECOMPENSE MODEL
Where applicable, conditions for financial recompense will be defined in the contractual
terms and conditions.
5.9 TRAINING AND KNOWLEDGE TRANSFER
All training and knowledge transfer requirements will be agreed with the customer and
documented prior to any service being supplied. These may include (but are not limited to):
Technical overview of the service and its relationship and interactions with other cloud-
based services.
Specific technical knowledge transfer training activities
Customer operational training focusing on the specific service.
Local support training (delivered in line with degree of knowledge transfer required).
5.10 ORDERING AND INVOICING PROCESS
L-3 ASA’s ordering and invoicing process is described in the L-3 ASA Terms and Conditions
document supplied as supporting documentation within the G-Cloud 4 framework. If
necessary, clarification or further details can be supplied by L-3 ASA on request prior to
ordering.
5.11 TERMINATION TERMS
The relevant termination terms are described in the L-3 ASA Terms and Conditions
document supplied as supporting documentation within the G-Cloud 4 framework.
5.12 DATA RESTORATION / SERVICE MIGRATION
Data restoration and service migration strategies relating to any service will be discussed and
agreed with the customer (and documented) prior to supply of the service.
5.13 CUSTOMER RESPONSIBILITIES
General customer responsibilities are described in the L-3 ASA Terms and Conditions
document supplied as supporting documentation within the G-Cloud 4 framework. All
service-specific customer responsibilities and dependencies will be discussed and agreed with
the customer (and documented) prior to supply of the service.
5.14 TECHNICAL REQUIREMENTS
All relevant technical requirements; both functional and non-functional (including service
dependencies technical interfaces, client side requirements, bandwidth / latency, etc.) will be
included in high and low level requirements and design documentation as appropriate.
Requirements matrices will be used to relate requirements at different levels and ensure the
delivered service is aligned with the customer’s requirements.
5.15 TRIAL SERVICES
The services described are not suitable for offering on a trial basis.