U.S. flag

An official website of the United States government, Department of Justice.

Defining Fusion Center Technology Business Processes: A Tool for Planning

NCJ Number
Date Published
April 2009
49 pages
Publication Series

Because many fusion centers are just beginning to plan for or implement the processes for managing the many capabilities that are assigned to them, this report was created by a working group to provide a tool that any fusion center can use in the creation and documentation of its own business processes.


The tool consists of a methodology for creating and documenting business processes, templates for both the process and capabilities that support the process, and key reference material. According to the U.S. Justice Department's Fusion Center Guidelines, "a fusion center will have the necessary structures, processes, and tools in place to support the collection, processing, analysis, and dissemination of terrorism, homeland security, and law enforcement information." The development of baseline operational standards is required under the National Strategy for Information Sharing (Strategy) and is a key step to reaching one of the strategy's goals of "Establishing a National Integrated Network of State and Major Urban Area Fusion Centers." Defining these operational standards allows Federal, State, local, and tribal officials to identify and plan for the resources need to achieve the strategy's goal, including financial, technical assistance, and human support. The current document builds on previous strategic planning initiatives in offering a methodology and framework that assists fusion centers in further defining the business process for their mission-critical services. It contains a list of key considerations for launching or improving fusion center processes, including the identification of potentially helpful technologies. A reference list of documents supplies key information on the business structure of fusion centers. Examples of a business architecture framework are provided for two typical business processes: "Suspicious Activity Reporting" and "Incident Data Collection and Analysis." Extensive tables and figures and appended additional resources

Date Published: April 1, 2009