Free Essay

Telephone Records Guide

In:

Submitted By elvinsal
Words 3845
Pages 16
Investigators Guide: Telephone Records
Requesting, Obtaining and Analyzing in Support of Criminal Investigations

The purpose of this guide is to provide investigators with a quick guide to assist them in the process of requesting, obtaining and analyzing telephone records

Investigators are faced with increasingly complex investigations every day. Many of those investigations require the use of telephone, particularly wireless telephone, records and information. Whether its incoming & outgoing calls, text messages, cell tower registrations or anything else that a cell phone can do, you may find that your investigation may benefit from that informa6 STEP tion. If you have a lot of experience requesting, obtaining and analyzing telephone records then you surely know it is a time consuming and complex process. If you are just starting out you will quickly learn a few things right away. The process of requesting and obtaining the records you need can take weeks to several months and in some instances you may never get the records for various reasons.

very important information that will avoid unnecessary delays, return requests for legal authority or worse, loss of information. The concepts in this Quick Guide also pertain to Internet investigations in many ways. Below are the six proven steps to requesting and obtaining telephone records in support of criminal investigations.

PROCESS— STEP 1 Determine what information you need

1. Determine what information you need 2. Make sure you have the correct provider

Knowing what you need will dictate what and how much 3. Send preservation letyou ask for and often depends ter immediately on the type of case you are 4. Ask for everything working. that you may need If you are working a major case such as a homicide in5. Obtain proper legal vestigation or some other maauthority jor crime you will likely be requesting everything you can 6. Analyze the data to get, hopefully without incurdevelop evidence ring a lot of cost to your agency. Other cases may only Cost to your agency require basic information such as account may be a significant factor when requestsubscriber. Most of the records you will be ing records as well. Generally speaking, seeking are from wireless providers and the for routine requests for records you should technologies and terminology used are often not incur any cost. You will also learn, if complex and require some research. Reyou haven't already, that providers do not member that you are requesting historical have law enforcement interests at heart records and not real time records. If you and will very often be less cooperative have a need for real time records you will than expected. This Guide is designed to provide some
(Continued on page 2)

PAGE 1

INVESTIGATORS GUIDE: TELEPHONE RECORDS
(Continued from page 1)

need a Pen Register, which is beyond the s c o p e o f t h i s g u i d e . What you are going to ask for? The basic categories of information are: Account information, Calls In/Out, Text messaging, Internet access/use and Tower/ sector. Account information may include all or some of the following: account initiation / termination, account holder, address information, alternate phone numbers, payment methods, device information, previous numbers, ported from/to, etc. Incoming and outgoing calls are just that and don't mean much with out date/time of the call (s) and sometimes the duration of the call. Be sure to spell out everything that you are in need of to further your investigation. Text messages and Internet records are so specific to the individual provider that you must reference their Law Enforcement guide and/or contact them directly to find out what is available and for how long. Tower and sector records are the specific locations where the device (cellular phone) registered and it used to be available easily but, based on case law, now requires a higher burden request than a subpoena (i.e. search warrant or court order). There is also more information available such as signal strength, direction, multiple tower/sector data or even near exact location. The amount and type of information, depending on the provider, is changing all of the time. One particular tool that is often unknown to the investigator is the availability of tower registration data or "tower dumps" as they are often called. Essentially it is information about every device that registered to a specific tower for a period of time. It can be very valuable if you are

looking to learn of all of the devices that were in a particular area at a given period of time. Learn what is available and what to ask for. You can do this by contacting the provider legal compliance department directly, using a good past example of a request and obtain and use the Law Enforcement Guides put out by most of the major providers. What period your are requesting? Different records are kept different lengths of time and varies by the type of information and the provider. For example incoming and outgoing calls are routinely kept for 180 days or more. Conversely text messages, if kept at all, are only available for a couple days to a week. You should reference the Law Enforcement guide or contact the providers legal compliance department to determine what window you are operating in. If you are going to be doing any computerized analysis of the telephone records received then you will likely want to get at least 180 days of data.

STEP 2 Make sure you have the correct provider
This can be one of the biggest problems to the telephone records aspect of your investigation. As of November 2003, wireless telephone numbers could be ported, or transferred, to another company for service. This is seen as a great option for consumers but an added hurdle for law enforcement. Prior to the implementation of Number Portability, if you had a phone number you could look up in a master database and determine unequivocally who was providing the telephone service. One of the best tools available for this
(Continued on page 3)

PAGE 2

INVESTIGATORS GUIDE: TELEPHONE RECORDS
(Continued from page 2)

information was FoneFinder http:// w w w . f o n e f i n d e r . n e t . Today it is not so easy because your target phone number may have started with any provider and now could have been ported two, three, four times. To address this issue the federal government has placed a company called Neustar in charge of the Number Portability program and Neustar offers tools to law enforcement to identify who the current provider of a phone number is. The first is IVR (http://www.npac.com/ lawenforcement/ivr.shtml) and it is an automated phone system that allows queries for telephone numbers to determine if the number is ported and which Service Provider currently holds the number. It is free to use but only allows you to check one number at a time over the phone. The second tool is their Local Number Portability Enhanced Analytical Platform or LEAP (http://leap.neustar.biz/). It is a fee based systems that allows a law enforcement agency to upload all of their target numbers and will provide the current provider and previous provider if applicable. The importance of LEAP will become apparent if your case requires you to identify the subscribers behind a series of telephone numbers. You will be able to then request subscriber information from the correct provider thereby eliminating potential delays from requesting from the previous or native provider. LEAP is not free and the cost range is $50-$1,600 per year depending on what plan you use.

of information you are requesting and how far back you want to go, the telephone service provider may or may not keep the information. For example, text message, if retained by the provider at all, are only kept for a couple of days to a week. To improve your chances of obtaining the information you need for your case, it is now generally recommended that you create a form letter that you send to the provider to advise them that you are seeking authorization to obtain information from their company and are asking them to preserve the information until such time that they receive the appropriate authority to provide you the information. This is called a Preservation Letter and should become a routine practice each and every time you are seeking information from a provider whether it is for telephone records or Internet records. The Preservation Letter can be in plain language and state:
"I am Detective Jones of the Town Hall Police Department, I am in the process of seeking legal authorization for records held by your company pertaining to telephone number 630-377-1234. Please retain all available records as of this date for a period of thirty days to allow me to secure the necessary authorization. Please confirm receipt of this request and forward any inquiries to me at 847-931-4000 or email at detjones@townhallpd.gov."

It can also be as specific or technical as you may need. It is also a good time to include a generic request for any available or updated Law Enforcement Guides to be emailed to you. It is often the case that the legal compliance person that handles your preservation letter will be the one assigned to assist you throughout your request process. This is a good time to build a relationship with them and let them help educate you on what may be available from their company. Be aware that
(Continued on page 4)

STEP 3 Send preservation request immediately
Depending on the provider and the type

PAGE 3

INVESTIGATORS GUIDE: TELEPHONE RECORDS
(Continued from page 3)

Ask for as much as you can justify This is important because it will hopefully limit the number of times you may have to obtain legal authority to seek records. Just because you get the authority to obtain all the information available to the provider does not mean you have to follow through and request all of it from the provider. A very well written document outlining all of the information that you are entitled to receive will send a message to the providers legal compliance person handling the request that you know what you are doing. Also, making it clear in a cover letter that you are not requesting everything that you could but only are asking for a subset of information to limit the burden on the provider and will request any additional information as needed. Follow-on authority The typical request process usually requires legal authority to obtain records from a provider for a target number. Once the target number records are received it usually becomes necessary to identify the subscriber for some or all of the numbers that were in contact with your target. That inturn requires you to obtain legal authority for each number and then grouped into one request per provider. A new and effective technique is to request all of the information in one legal authority. Essentially you are requesting all of the needed information on your target number and inclusive of that request your are requesting the subscriber information from any U.S. provider for the numbers contacted by your target. Electronic format It is not unusual for legal compliance requests to be ten or more pages and to have hundreds or even thousands of records of activity. Requests received in paper format or any other format that does not allow you
(Continued on page 5)

there are usually only a handful of legal compliance personnel working for these companies and they deal with thousands of requests each year. They typically are not intimidated by police or fearful of being "hauled into court" so tailor your conversation appropriately since they are the gatekeeper to the information that you need. It is important to note as well, that your submission for information must go through the legal compliance department for the provider. A local providers retail store will not provide the information you are seeking.

STEP 4 Ask for everything that you may need.
Language in your request like, "Any and all records" will result in the most basic information from the providers. If you rely on someone else to write your request or you use the terminology "any and all records" and you think that will get you everything you need you are about to make your first mistake. First, you should write your own request and hopefully do so from a very good example used in the recent past. Your request will probably not will not be one page either. It will likely need to be more than one page to ensure that it is clear and concise on what information you are requesting. The terminology "any and all records pertaining to..." seems like a great catch all to have in your request but the over use of this term has caused the providers to consider it overly vague and broad and will typically only provide the basic information for your request. Meaning that you will likely get the name on the account and the last 30 days of incoming and outgoing calls, that's it!

PAGE 4

INVESTIGATORS GUIDE: TELEPHONE RECORDS
(Continued from page 4)

to import it into a computer application will seriously hamper your ability to analyze the data. It is imperative for true analysis of the data that you receive it in a electronic format to allow you to mine the data. Without out it you will be relegated to several hours of staring at numbers and probably not getting all that could get. Electronic records need to be requested, and clearly spelled out, in your legal authority to receive them in electronic format. The records received need to be able to be imported into a spreadsheet such as Microsoft Excel or any other. The most universally acceptable format is Comma Separated Value (CSV). Just asking for the information in "electronic format" is not good enough and what that most often will result in is a PDF file which is in an "electronic format" but is difficult at best to import into your spreadsheet application. The recommended language for your legal authorization is: “records shall be provided in a standard electronic format such as Comma Separated Value (CSV) or other format that can be directly imported into a spreadsheet application".

need. Depending on your County's Grand Jury process, it may take a couple weeks to a month or more to get your subpoena for the information that you need. Many jurisdictions are now going to affidavit submissions to the Grand Jury to avoid having to appear, which certainly saves some time, but Grand Jury Subpoenas are not the only legal authority to obtain the records you are in need of to support your investigation. As an alternative to the Grand Jury you may be able to use a Search Warrant, Court Order or even Customer Consent to obtain the information. Search Warrants may be used when you have Probable Cause showing that the information held by the provider will provide evidence of a crime. Search Warrants will be required if you are seeking tower/sector/ location information from a provider. Search Warrants can usually be prepared in a couple of hours and can be served via U.S. Mail however the Probable Cause burden may make it difficult to obtain. Search Warrants can be sealed to protect the investigative process. Court Orders may be used as well but are more often used when a subject has been charged/indicted with a crime and requires a motion in front of a judge to evaluate the request. The Defense may also be a party to the motion and you will be required to testify and will lose any anonymity with the process. Customer consent is a lesser known provision of the law. Under United States Code you are authorized to obtain consent from a customer for the provider to provide law enforcement the necessary records to carry out the investigation. Of course this has limited application since you must get the target to consent to providing the records but in instances of threats, kidnapping, stolen phone, missing person, etc where you have a customer who has the le(Continued on page 6)

It is also a best practice to request the response sent to your official law enforcement agency email address instead of a personal email address like yahoo or hotmail.

STEP 5 Use the proper legal authority to obtain the information needed
You may have requested telephone records a dozen times ,or maybe you are doing it for the first time, but odds are you have used a Grand Jury Subpoena each time to request the information that you

PAGE 5

INVESTIGATORS GUIDE: TELEPHONE RECORDS
(Continued from page 5)

gal authority to give it they can authorize you to obtain their records. You would then send it directly to the provider and not need any legal authority beyond their consent. Exigent request - when someone’s life is endangered the law allows law enforcement to get information from the providers in an expedited fashion. The process can provide you near-real-time location information of a cellular device which is intended to mitigate the risk to life. The process has been abused by law enforcement and is not to be used when there is not legitimate life endangerment. Pen Register/Trap and Trace - Is the process of capturing in real time the numbers dialed by a target phone and the numbers and caller ID of the persons calling the target phone. The pen register/trap and trace provisions of the law have been used successfully by Federal law enforcement and others for a very long time. Unfortunately the cost and process of implementing a Pen Register has prohibited it from becoming a mainstream law enforcement tool. In recent years the costs have come down considerably and the process is easier. It is likely that the use of Pen Registers will increase by mainstream law enforcement in the future.

format and the second is that there is a training gap about what is available and what to do with the information once you do obtain it. In most cases, records are obtained in a non-electronic format so there isn't much that can be done with it anyways. If all you are intending to do is identifying or highlighting some numbers during a date range or event time then you probably don't need to do much else with your records, but, if you want to glean more data, and hopefully evidence, from your telephone data then you will need to get it in an electronic format and then you can begin to analyze the data you have obtained. Analysis does appear very complicated and time consuming to the untrained investigators but with some preparation and training any investigator can begin to analyze their telephone records. You may be looking to analyze a small subset of information such as a particular day or event or you may be looking to develop patterns of contact or use on a case. In either case, the principles are the same, get the information into a format where you can analyze the data, perform your analysis and document the steps you took to come to your conclusions. Analysis starts with the computer application. Unless you have a commercially available data analysis program like Penlink, I2 Analyst Notebook or Threads, you will probably be using a spreadsheet to perform your analysis on the data. It is important to note that most of the analysis can be done with a spreadsheet application such as Microsoft Excel or even free spreadsheet applications like Open Office or Google Spreadsheets. Once you import the data into your spreadsheet then you can conduct frequency analysis, event analysis, link analysis and geographic analysis. You can sort, clean, highlight, pivot, batch and even add to the data.
(Continued on page 7)

STEP 6 Analyze the data to develop evidence
There is a significant amount of untapped information available from telephone records and most investigators do not do much, if any, in-depth analysis of the information they receive. There are two primary reasons I have seen for this - first is that the information received prevents any real analysis when it is obtained in paper

PAGE 6

INVESTIGATORS GUIDE: TELEPHONE RECORDS
(Continued from page 6)

Frequency Analysis— is done by looking at how often, what interval or pattern the numbers called or received are contacted which indicates types of relationships between the parties. Event Analysis— is the process of analyzing what call activity or sequences occurred during a specific period of time.

and important of an identifier as a full name, date of birth, social security number or criminal history identification number. Developing a program to routinely collect and use those numbers by all officers can prove to be an immensely powerful intelligence tool, particularly if it is linked up with other agencies or centralized with a Sheriff’s Office or Prosecutors Office.

Link Analysis— is the process of identifySheriff’s Offices with jail telephone systems ing numbers/subjects and their intercan be even more valuable relations to each other. since they typically record Link Analysis does require Agencies that are all outgoing calls and can the records of two or more access telephone number subjects/phones to deterlooking for a low cost and subscriber information. mine the links between the tool to improve their activities. The telephone number daGeographic Analysis—is the process of listing or plotting the location information to provide proximal relationships for investigative leads. Cell tower & sector information is the primary information used but area code can be used with the assumption that the caller was actually in that area.

use of telephone records data can implement or that cies. an in-house Database System easily be Telephone Pointer can

linked to other agenThe results can be a time and money

tabase when setup at its most basic level becomes a pointer system for law enforcement. It is impractical to call every law enforcement agency near your jurisdiction to inquire if they had contact with a subject or telephone number, but, if there was an established pointer system you could check all submitting agencies with one cell phone number inquiry.

saving intelligence The resulting information Telephone Pointer Syscould avoid un-necessary system that helps tem—Agencies that are investigative delays of waitlooking for a low cost tool ing on subpoenaed phone solve cases! to improve their use of records and can literally telephone records can imhelp solve cases and those plement an in-house telephone database or cases could be a routine case, homicide or pointer system. even a terrorism case.
Statistics show that nearly everyone law enforcement encounters has a cell phone, and as a result, an individual cell phone number. That cell phone number can be as unique

Investigation Technologies, LLC www.investigation-technologies.com Email: invetech@gmail.com

PAGE 7

Similar Documents

Free Essay

Ethics Class

...| Operate telephone switchboard to answer, screen and forward calls, providing information, taking messages and scheduling appointments | Customers, Clients | Telephone, e-mail | To provide information to clients and schedule appointments | Greet persons entering establishment, determine nature and purpose of visit, and direct or escort them to specific destinations | Clients, Customers | - | To assist clients and customers and to make them satisfied about the establishment | Transmit information or documents to customers, using computer, mail, or facsimile machine | Customers, Clients | Telephone, email, mail, facsimile machine | To co-ordinate the process. | Collect, sort, distribute and prepare mail, messages and courier deliveries | Customers, Clients | Mail, telephone, computer | To co-ordinate the process | Provide information about establishment such as location of departments or offices, employees within the organization, or services provided | Customers, Clients | - | To help clients in getting familiar with the establishment and clarify their queries | File and maintain records | HR manager | Data entry | For future reference | Hear and resolve complaints from customers and public | Customers | Telephone, email, mail | To solve tickets and answer queries | Perform administrative supportive tasks such as proofreading, transcribing handwritten information, and operating calculators or computer to work with pay records, invoices, balance...

Words: 1977 - Pages: 8

Free Essay

Essay

...Consumer Information Guide 2015–2016 August 2015 Table of Contents Consumer Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 About University of Phoenix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Accreditation, Licensures, Reviews and Approvals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Federal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Regional Accreditation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 State and International Licensures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Program Accreditation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 School of Business/Business Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 College of Health Professions: School of Nursing . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 50205 - Pages: 201

Free Essay

Cmgt 442

...Executive management System EMS This is a step-by-step guide for using EMS – Executive Management System, where executive managers can view data regarding a student's demographic characteristic, enrollment record in particular campuses, attendance record and projected fee account summary. System Overview The purpose of the Executive Management System (EMS) is to view data regarding a student's personal information, enrollment record in particular Campus, attendancerecord, current status of the student, and summary of fee account. During each reporting period, University Campuses submit record for student's enrolled in the University. Student's Information Record collected before the start of each semester. Attendance Record and student academic record are also collected during the semester tenure. EMS is a web-based system allowing access from any computer with an internet connection with no additional software installation. The management of web-based software is much more centralized and easier to keep updated. EMS manage daily University needs, Executive and administrators can save time and have immediate access to a variety of student data. These systems are needed for all parties involved in education – Executive, teachers, administrators, etc. A EMS allows to view up-to-date information about the students, grades, attendance etc. Key Features EMS consist of following key features; * Student Information Module * Courses Information * Attendance...

Words: 844 - Pages: 4

Premium Essay

Compensation Management

...Mission: We satisfy our customers by delivering results through quality chemical & cosmetics products and services. Our desire to grow drives our passion to win in the marketplace. With a unified, low-cost operating structure, we’ll remain competitive across every business and in every district of Bangladesh. Vision: Our Vision is to become a low cost leader in the market by competing with the existing dominant firms using low cost strategy and provide standard chemical & cosmetics to the root level customers. Organizational Structure: Job Description of General Manager: * Hires, trains, and motivates all Department managers.  * Directs and monitors all management or supervisory personnel functions and completes formal performance evaluations of all department managers.  * Meets with the comptroller/office manager monthly to review departmental forecasts for consistency with the annual forecast.  * Meets with managers individually to develop monthly and annual goals and objectives, and to review actual performance.  * Monitors the daily operating control (DOC), recommending improved courses of action where necessary. * Ensures that the monthly financial statement is complete, accurate, and submitted on time to the factory.  * Develops and maintains a good working relationship with lending institutions and manufacturer personnel.  * Communicates management policies and procedures to all employees and ensures that they are understood...

Words: 3116 - Pages: 13

Free Essay

Children’s Internet Protection Act, 2000

...The Children’s Internet Protection Act (CIPA) is a federal law which was passed by Congress to allocate the offensive content over the Internet. The Children's Internet Protection Act (CIPA) requires that K-12 schools and libraries in the United States use Internet filters and implement other measures to protect children from harmful online content as a condition for the receipt of certain federal funding. It was signed into law on December 21, 2000 and was found to be constitutional by the United States Supreme Court on June 23, 2003. CIPA obligates the schools and all public libraries to require filters on their computers to stop minors from accessing sites that are not appropriate. (Federal Communications Commission, n.d.) The (CIPA) was passed in December 2000. The main purpose of the CIPA is for the protection of children from obscene, child pornography and other dangers of the internet. CIPA does not precisely state what kind of filtering systems to use. This is the third law that Congress has passed to allocate concerns about the children’s access to the inappropriate Internet sites and it is the only one “that the U.S. Supreme Court found constitutionally defensible.” (Minnesota House of Representatives House Research, 2004) Our kids face online predators and other inappropriate things in chat rooms, online games, pictures of teens drinking, drugs, sexual messages, and even false information about them written online before they are eighteen. (Covenant Eyes, 2012)...

Words: 700 - Pages: 3

Premium Essay

Upload

...Portability and Accountability Act of 1996 T he Health Insurance Portability and Accountability Act, commonly referred to as HIPAA, became a federal law in 1996. The act contains insurance reform provisions and introduces the establishment of a fraud and abuse control program when rendering medical care to Medicare patients. In 2000, regulations were established to protect the privacy of personal health information maintained by health care providers, health plans, hospitals, health care clearinghouses, and health insurers. These regulations became effective in 2003 (2004 for small health plans). Violators of HIPAA may be subjected to fines, prison, or both. HIPAA is organized into three parts: • Privacy regulations. HIPAA regulations guide health care providers with overall privacy measures, such as turning the charts toward the wall and making sure the computer screen is not visible. Five forms are required (privacy notice, acknowledgment, authorization, business associate agreement, and trading partner agreement). • Transaction standards. Requirements must be followed when putting the office software into HIPAA compliance. • Security regulations. HIPAA requires health care providers to keep computers safe. The first two parts had 2003 deadlines for compliance and the third part has a 2005 deadline. To adhere to the HIPAA regulations, a medical practice must have an appointed privacy official draft privacy policies and procedures, and implement a program to educate and train...

Words: 1848 - Pages: 8

Free Essay

Constructing a New Structure- Building Codes

...Constructing a new Structure- Building Codes The information in this document should be useful in making design-related decisions that will not only satisfy the move to our new building Information Technology (IT) requirements but also meet the needs of the building and its future occupants with respect to voice, video and data communications. The intention of this document is to provide a comprehensive understanding and reference guide that can be referred to when moving to our new building. Moving into our new building we need to follow certain cable codes and specification. A properly designed network is based around components or wiring units. The components should also follow certain performance specifications so that when installing we will know exactly what types of applications will be supported. The cable specifications and building codes requirements that we use will be based on * ANSI/EIA/TIA standards 568-C-- Commercial Building Telecommunications Cabling Standard * ANSI/EIA/TIA 569-- Commercial Building Standards for Telecommunications Pathways and Spaces; ANSI/EIA/TIA 606- Administration Standard for the Telecommunications Infrastructure of Commercial Buildings * ANSI/EIA/TIA 607-Commercial Building Grounding and Bonding Requirements for Telecommunications; BICSI Telecommunications Distribution Methods Manual (TDMM) and NFPA 70--National Electric Code (NEC). Cabling has changed over time. Cabling installations have evolved from proprietary systems...

Words: 2982 - Pages: 12

Premium Essay

Leaders Book

...Leader’s Book NAME INSERT YOUR NAME UNIT INSERT YOUR UNIT PHONE # INSERT YOUR NUMBER Creed of the Noncommissioned Officer Creed of the Noncommissioned Officer No one is more professional than I. I am a Noncommissioned Officer, a leader of soldiers. As a Noncommissioned Officer, I realize that I am a member of a time honored Corps, which is known as “The Backbone of the Army.” I am proud of the Corps of Noncommissioned officers and will at all times conduct myself so as to bring credit upon the Corps, the Military Service and my country regardless of the situation in which I find myself. I will not use my grade or position to attain pleasure, profit or personal safety. Competence is my watch-word. My two basic responsibilities will always be uppermost in my mindaccomplishment of my mission and the welfare of my soldiers. I will strive to remain tactically and technically proficient. I am aware of my role as a Noncommissioned Officer. I will fulfill my responsibilities inherent in that role. All soldiers are entitled to outstanding leadership; I will provide that leadership. I know my soldiers and I will always place their needs above my own. I will communicate with my soldiers and never leave them uninformed. I will be fair and impartial when recommending both punishment and rewards. Officers in my unit will have maximum time to accomplish their duties; they will not have to accomplish mine. I will earn their respect and confidence as well as those of...

Words: 6288 - Pages: 26

Free Essay

Short Paper

...FINANCIAL MANAGEMENT GUIDE FOR NON-PROFIT ORGANIZATIONS NATIONAL ENDOWMENT FOR THE ARTS OFFICE OF INSPECTOR GENERAL SEPTEMBER 2008 Questions about this guide may be directed to the National Endowment for the Arts, Office of Inspector General, Room 601, 1100 Pennsylvania Avenue, NW, Washington, DC 20506, Telephone (202) 682-5402. Questions about the terms and conditions of grants and cooperative agreements may be directed to the Office of Grants and Contracts, Room 618, Telephone (202) 6825403. Table of Contents Page Use of the Guide .................................................................................................................................... 1 Accountability Requirements ................................................................................................................ 1 Financial Management Standards ............................................................................................. 1 Internal Control Standards ........................................................................................................ 2 Audit Standards ......................................................................................................................... 3 Reporting Standards .................................................................................................................. 4 Subgranting .............................................................................................................................

Words: 3186 - Pages: 13

Premium Essay

Hostel Management

...System Requirement Specifications (SRS) Assignment 1 Sample Solution System Requirement Specifications 1 Table of Contents 1 2 3 Table of Contents ......................................................................................................................................................... 1 Problem Statement ....................................................................................................................................................... 2 Overview ...................................................................................................................................................................... 2 3.1 Background ............................................................................................................................................... 2 3.2 Overall Description ................................................................................................................................... 2 4 Investigation & Analysis Methodology........................................................................................................................ 2 4.1 System Investigation ................................................................................................................................. 2 4.2 Analysis Methodology .............................................................................................................................. 3 4.2.1 Feasibility study and requirements elicitation...

Words: 2557 - Pages: 11

Premium Essay

System Requirment

...System Requirement Specifications (SRS) Assignment 1 Sample Solution System Requirement Specifications 1 Table of Contents 1 2 3 Table of Contents ......................................................................................................................................................... 1 Problem Statement ....................................................................................................................................................... 2 Overview ...................................................................................................................................................................... 2 3.1 Background ............................................................................................................................................... 2 3.2 Overall Description ................................................................................................................................... 2 4 Investigation & Analysis Methodology........................................................................................................................ 2 4.1 System Investigation ................................................................................................................................. 2 4.2 Analysis Methodology .............................................................................................................................. 3 4.2.1 Feasibility study and requirements elicitation...

Words: 2557 - Pages: 11

Free Essay

Physical Networking

...Constructing a new Structure- Building Codes The information in this document should be useful in making design-related decisions that will not only satisfy the move to our new building Information Technology (IT) requirements but also meet the needs of the building and its future occupants with respect to voice, video and data communications. The intention of this document is to provide a comprehensive understanding and reference guide that can be referred to when moving to our new building. Moving into our new building we need to follow certain cable codes and specification. A properly designed network is based around components or wiring units. The components should also follow certain performance specifications so that when installing we will know exactly what types of applications will be supported. The cable specifications and building codes requirements that we use will be based on * ANSI/EIA/TIA standards 568-C-- Commercial Building Telecommunications Cabling Standard * ANSI/EIA/TIA 569-- Commercial Building Standards for Telecommunications Pathways and Spaces; ANSI/EIA/TIA 606- Administration Standard for the Telecommunications Infrastructure of Commercial Buildings * ANSI/EIA/TIA 607-Commercial Building Grounding and Bonding Requirements for Telecommunications; BICSI Telecommunications Distribution Methods Manual (TDMM) and NFPA 70--National Electric Code (NEC). Cabling has changed over time. Cabling installations have evolved from proprietary systems...

Words: 2980 - Pages: 12

Premium Essay

Srs for Course Registration System

...System Requirement Specifications (SRS) Assignment 1 Sample Solution System Requirement Specifications 1 Table of Contents 1 2 3 Table of Contents ......................................................................................................................................................... 1 Problem Statement ....................................................................................................................................................... 2 Overview ...................................................................................................................................................................... 2 3.1 Background ............................................................................................................................................... 2 3.2 Overall Description ................................................................................................................................... 2 4 Investigation & Analysis Methodology........................................................................................................................ 2 4.1 System Investigation ................................................................................................................................. 2 4.2 Analysis Methodology .............................................................................................................................. 3 4.2.1 Feasibility study and requirements elicitation...

Words: 2557 - Pages: 11

Free Essay

Job Analysis

...Percent (%) | | |of Time | |Secretary | | |1. Performs a variety of typing duties including standard letters, reports and forms. | | |2. Takes and transcribes dictation. Composes letters and memos as directed. |25% | |3. Maintains departmental files; ensures that all records are updated and modified as necessary. |25% | |4. Answers the telephone and greets visitors....

Words: 1808 - Pages: 8

Premium Essay

Free

...PERFORMANCE WORK STATEMENT Table of Contents 1 OVERVIEW 1 2 CONTRACT REQUIREMENTS 1 2.1 Objectives Fulfillment 1 2.1.1 Business Objectives 1 2.1.2 Technical Objectives 2 2.1.3 Management Objectives 3 2.2 Assumptions and Constraints 3 2.2.1 Access Control 4 2.2.2 Authentication 4 2.2.3 HSPD-12 Personnel Security Clearances 4 2.2.4 Non-Disclosure Agreements 5 2.2.5 Accessibility 5 2.2.6 Data 5 2.2.7 Confidentiality, Security, and Privacy 5 2.3 Tasks/Sub-Tasks to Be Performed Related to Initiating the Service 6 2.3.1 Task 1: 6 2.3.2 Task 2: 7 2.4 Period of Performance 7 3 PERFORMANCE MANAGEMENT OF THE DELIVERED SERVICES 8 3.1 Modifications to Service Level Agreements 8 3.2 Changes to Key Performance Measures. 8 3.3 Quality Assurance Evaluation 8 3.4 Government Roles and Responsibilities. 9 3.4.1 Contracting Officer (CO) 9 3.4.2 Contract Specialist 9 3.4.3 Contracting Officer’s Technical Representative (COTR) 10 3.4.4 Other Key Government Personnel 10 3.5 Contractor Roles and Responsibilities 10 4 METHODS OF QUALITY ASSURANCE SURVEILLANCE 11 5 SECURITY REQUIREMENTS 11 5.1 Required Policies and Regulations for GSA Contracts 11 5.2 GSA Security Compliance Requirements 13 5.3 Certification and Accreditation (C&A) Activities 13 5.3...

Words: 7425 - Pages: 30