Mobile Data and Records Management complete the field-to-archive data chain

System

Emergency Dispatch System, session 258. Decomposition status: in-progress with 6 of 7 subsystems now component-decomposed. This session completed the {{entity:Mobile Data Subsystem}} (5 components) and {{entity:Records Management Subsystem}} (4 components), closing the data path from field responders through the PSAP back to long-term records. The {{entity:Network Infrastructure Subsystem}} remains as the final subsystem before first-pass completion.

Decomposition

The Mobile Data Subsystem bridges the PSAP to field units over FirstNet/LTE cellular networks. Five components were classified and integrated:

  • {{entity:Mobile Data Terminal Application}} {{hex:40FD7119}} — in-vehicle software displaying dispatch assignments and accepting status updates
  • {{entity:Mobile Data Gateway Server}} {{hex:50B57118}} — PSAP-side middleware managing 200+ concurrent MDT sessions with store-and-forward queuing
  • {{entity:CJIS Query Proxy}} {{hex:50A53859}} — security-isolated proxy enforcing CJIS Security Policy v5.9 for NCIC/state database queries
  • {{entity:Automatic Vehicle Location Module}} {{hex:55F57219}} — GPS tracking at 10-second intervals feeding CAD unit positioning
  • {{entity:FirstNet LTE Communications Module}} {{hex:D4E55058}} — Band 14 LTE with QPP priority and commercial LTE roaming fallback
flowchart TB
  AVL[Automatic Vehicle Location Module]
  MDT[Mobile Data Terminal Application]
  LTE[FirstNet LTE Communications Module]
  GW[Mobile Data Gateway Server]
  CJIS[CJIS Query Proxy]
  AVL -->|GPS position data| MDT
  MDT -->|App data over LTE| LTE
  LTE -->|Encrypted LTE transport| GW
  GW -->|CJIS queries and responses| CJIS
  MDT -->|NCIC query requests| CJIS

The Records Management Subsystem handles post-incident data lifecycle. Four components:

  • {{entity:Incident Report Database}} {{hex:40853359}} — canonical store for 10+ years of incident records with AES-256 encryption at rest
  • {{entity:Records Search and Retrieval Engine}} {{hex:50E73B19}} — full-text and fuzzy name search across millions of historical records with role-based redaction
  • {{entity:Retention and Purge Manager}} {{hex:41B73B79}} — automated retention policy enforcement with legal hold suspension and certified purge audit trails
  • {{entity:Report Generation Module}} {{hex:51E77B58}} — UCR/NIBRS compliance reporting and statistical analytics
flowchart TB
  SEARCH[Records Search and Retrieval Engine]
  DB[Incident Report Database]
  RET[Retention and Purge Manager]
  RPT[Report Generation Module]
  SEARCH -->|Search queries| DB
  RET -->|Retention policy enforcement| DB
  RPT -->|Report data extraction| DB

Analysis

The CJIS Query Proxy’s isolation as a separate component from the Mobile Data Gateway is architecturally significant. Cross-domain similarity search revealed COMSEC Key Management Module from the naval combat domain shares 29 traits — both are security boundary enforcement components that mediate access to classified/sensitive data stores with independent audit logging. This pattern recurs wherever a general-purpose communications gateway must interface with a restricted information system.

The Incident Report Database received hex code {{hex:40853359}}, identical to the CAD Database and Event Logger ({{hex:40853358}}) — differing only in bit 0 (System-Essential vs not). Both are data stores within emergency dispatch, but the Records database is a compliance archive while the CAD database is operationally critical. The single-bit distinction correctly captures that CAD database failure stops dispatching, while Records database failure degrades reporting but does not impede real-time operations.

Lint returned 1 low finding (42 requirements lacking “SHALL” keyword) — all are ARC decisions and VER entries, previously acknowledged in session 257 as intentionally non-SHALL by design. No new findings. Zero orphaned traceable requirements; 9 orphaned ARC decisions are expected (design rationale, not traced).

Requirements

Generated 15 subsystem requirements ({{sub:SUB-REQS-040}} through {{sub:SUB-REQS-054}}), 8 interface requirements ({{ifc:IFC-DEFS-021}} through {{ifc:IFC-DEFS-028}}), and 10 verification entries ({{sub:VER-METHODS-024}} through {{sub:VER-METHODS-033}}). All interface requirements have corresponding verification entries. Key traces:

  • {{sub:SUB-REQS-040}} (gateway 200 sessions) and {{sub:SUB-REQS-042}} (MDT 2s display) derive from {{sys:SYS-REQS-004}} (5s end-to-end dispatch delivery), with the time budget allocated as 2s gateway + 1s network + 2s MDT rendering
  • {{sub:SUB-REQS-046}} and {{sub:SUB-REQS-047}} derive from {{sys:SYS-REQS-010}} (CJIS compliance), flowing security requirements through the dedicated proxy and FirstNet transport
  • {{sub:SUB-REQS-050}} through {{sub:SUB-REQS-054}} (Records Management) trace to {{sys:SYS-REQS-006}} (100% recording) and {{sys:SYS-REQS-010}} (CJIS security), covering the data lifecycle from capture through retention and eventual certified purge

Architecture decisions {{sub:ARC-DECISIONS-008}} and {{sub:ARC-DECISIONS-009}} document component separation rationale for both subsystems.

Next

Network Infrastructure Subsystem is the sole remaining subsystem. It underpins all other subsystems with LAN/WAN connectivity, redundancy, and cybersecurity controls. Once decomposed, the system reaches first-pass-complete status and enters QC review. Network Infrastructure will likely include core switching, firewall/IDS, ESInet border gateway, PSAP-to-backup-PSAP WAN, and time synchronization — estimated 5-6 components.

← all entries