News Archive

NIC’s Jayne Friedland Holland: Fusion Centers Can Help Agencies Combat Hacktivism

March 29, 2017

Jayne Friedland Holland, chief security officer at information services provider NIC, has said that fusion centers can help government agencies defend against hacktivism and other cybercrimes through intelligence data sharing.  She recommended that state and local agencies collaborate with other stakeholders, establish an internal information sharing structure, initiate outreach to the private sector, and introduce fusion center personnel to authorities to deepen engagement with fusion centers.  

Source: Executive Biz

NIJ National Sexual Assault Policy Symposium Video, Transcript Available

March 29, 2017

Visit to access video and transcripts for the National Institute of Justice’s first National Sexual Assault Policy Symposium, held in September 2016.  In the video, symposium organizers and attendees describe the groundbreaking event and its significance in improving and advancing sexual assault response across jurisdictions in the United States.

Source: National Institute of Justice

National Crime Victims’ Rights Week Starts April 2

March 28, 2017

The Office for Victims of Crime offers resources related to National Crime Victims’ Rights Week, set for April 2–8, 2017.  Visit for fact sheets on this year’s theme, “Strength—Resilience—Justice.”  This theme reflects a vision of the future in which all victims are strengthened by the response they receive, organizations are resilient in response to challenges and communities are able to seek collective justice and healing. 

What the Public Knows About Cybersecurity

March 28, 2017

A Pew Research Center survey was conducted on June 17–27, 2016, among 1,055 adult Internet users living in the United States.  The survey consisted of 13 questions and was designed to test Americans’ knowledge of a number of cybersecurity issues and terms.  The results of the survey found that many Americans are unclear about some key cybersecurity topics, terms, and concepts. 

Search Earth With AI Eyes Via a Powerful New Satellite Image Tool

March 15, 2017

On March 7, a New Mexico startup that provides artificial intelligence (AI)-driven analysis of satellite images to governments, academics, and industry released a public demo of its GeoVisual Search, a new type of search engine that combines satellite images of Earth with machine learning on a massive scale.  Users can pick an object anywhere on Earth that can be seen from space, and the system returns a list of similar-looking objects and their locations on the planet.  GeoVisual Search operates on top of an intelligent machine-learning platform that can be trained and will improve over time.  This technology could potentially be used in various way by law enforcement, such as helping identify critical infrastructure and assets in an area.

Source: CNET

Threat Hunting Becoming Top-of-Mind Issue for SOCs

March 14, 2017

The use of threat-hunting techniques to combat cyberattacks is increasing, according to a new report.  Threat hunting appears to have become a top-of-mind issue for security executives at many organizations.  But a relative lack of security staff and technology tools is limiting their ability to fully build out such programs.  The Information Security Community on LinkedIn recently polled its members on the state of threat hunting in their security operations centers.  The poll, sponsored by several security firms, elicited responses from 330 members.  The majority of respondents indicated that threat hunting either should or will be their top security initiative in 2017.  “Threat hunting” is a term that is generally used to describe the practice among security organizations to proactively search for and weed out threats on their network instead of waiting to discover them after an attack has materialized.  Organizations that have implemented successful threat-hunting programs have often pointed to the emphasis on human skills as a major contributory factor.

Most Hackers Can Access Systems and Steal Valuable Data Within 24 Hours: Nuix Black Report

March 14, 2017

Most Hackers Can Access Systems and Steal Valuable Data Within 24 Hours: Nuix Black Report

The Nuix Black Report—the results of a confidential survey of 70 professional hackers and penetration testers at DEFCON, the world’s largest hacking and security conference—will overturn many conventional understandings and customs of the cybersecurity industry.  By examining the security landscape from the hacker’s perspective, the report has revealed results that are contrary to the conventional understanding of cybersecurity. For example:

  • Respondents said traditional countermeasures such as firewalls and antivirus almost never slowed them down, but endpoint security technologies were more effective at stopping attacks.
  • More than half of respondents changed their methodologies with every target, severely limiting the effectiveness of security defenses based on known files and attacks.
  • Around one-third of attackers said their target organizations never detected their activities.
Source: Nuix

Massive Indiana IoT Lab Brings Innovation Space to the Midwest

March 13, 2017

The Internet of Things (IoT) ecosystem in Indiana is about to get a big boost.  The Indiana IoT Lab-Fishers recently announced it will act as a space for businesses to research, innovate, and collaborate on projects in the expanding field.  It will aim to help businesses investigate and improve the four main parts of IoT solutions:  ideation, cloud data, edge software, and development.  Connected devices are prevalent in our daily lives, from wearable fitness bands to self-driving cars, and it is important to understand the potential security risks involved.  Indiana Governor Eric Holcomb said the initiative falls in line with his “Next Level Legislative Agenda,” which proposes investing $1 billion over the next ten years in innovation and entrepreneurship.

The Intelligence-Driven Prosecution Model: A Case Study in the New York County District Attorney’s Office

March 9, 2017

The Intelligence-Driven Prosecution Model (IDPM), designed and implemented by the New York County District Attorney’s Office (DANY), is a prosecutorial strategy rooted in the rigorous collection of background information about the people, places, and problems driving crime in specific neighborhoods.  Through enhanced information gathering—including close coordination with local law enforcement and robust community outreach—the IDPM intends to facilitate improved prosecutorial decision making.  Technology-centered intelligence collection that focuses on specific people and places driving crime adds a unique dimension to data analysis.  With funding from the U.S. Department of Justice’s Bureau of Justice Assistance, a study was conducted to document how the IDPM operates and explore the model’s implementation and effects in New York County, known more widely as the borough of Manhattan.

Law Enforcement Near Miss Database

March 7, 2017

The Police Foundation has developed a voluntary, nondisciplinary reporting system that allows law enforcement personnel to read about and anonymously share “close calls” or “near misses,” to help protect others from similar incidents.  The database is designed to capture reports of incidents in which law enforcement officers narrowly avoided serious injury, fatalities, significant property damage, or other significant crisis, so that these events can be learned from to improve safety for officers and civilians.

Press Release: SAVER Program Reports Now Available for Download

March 6, 2017

On February 6, 2017, the U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced that reports produced by the System Assessment and Validation for Emergency Responders (SAVER) Program are now available for download on the S&T Web site, a one-stop shop for resources to help responders make better purchasing decisions.  The goal of the SAVER Program is to provide cost and time savings to federal, state, and local responders as they decide which equipment to purchase.

Source: DHS

New FBI Wanted App: Making It Easier to Find Fugitives and Missing Persons

February 13, 2017

The just-released FBI Wanted mobile app allows the public to view, search, sort, filter, and bookmark the full range of information issued by the FBI, including pictures and descriptions of wanted fugitives, missing persons, crime suspects, deceased victims, and others the Bureau is seeking to locate or identify. The free app works on Apple and Android devices, including smartphones, iPads, and iPods. The FBI hopes that the public will use the information in the app to help solve cases and return missing persons to their homes.


Source: FBI

Center Arms Deputies With Data to Fight Crime

February 10, 2017

Personnel at the Montgomery County Sheriff’s Office’s Criminal Intelligence Center in Dayton, Ohio, analyze data in almost real time to support area law enforcement, and the center is an invaluable resource to local departments.  For example, one local law enforcement agency relies on the center particularly on lengthy investigations that require detectives to put all the players together in complicated cases.  

Source: Dayton News

License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities

February 10, 2017

License Plate Reader Policy Development Template for Use in Intelligence and Investigative Activities is designed specifically for law enforcement entities and fusion centers to assist their efforts in developing and implementing comprehensive privacy, civil rights, and civil liberties policies regarding the use of automated license plate readers (ALPRs or LPRs) in intelligence and investigative activities.  Developed by state, local, and federal law enforcement practitioners with LPR expertise and privacy subject-matter experts, the provisions of the LPR Policy Template are intended to be incorporated into agency operational policies and day-to-day operations. Each section represents a fundamental component of a comprehensive policy that includes baseline provisions on LPR information collection; information quality; access and disclosure; redress; security, retention, and destruction; accountability and enforcement; and training. Sample language is provided for each recommended provision, as well as appendices that contain a glossary of terms and definitions, citations to federal and case law, and a draft model policy. 

Source: GLOBAL

House Passes Bill Requiring Warrants for E-Mail Searches

February 10, 2017

On February 6, 2017, the House passed a bill aimed at modernizing the United States’ aging law covering law enforcement access to e-mails and other stored files.  The current law, known as the Electronic Communications Privacy Act, allows law enforcement to access any stored files without a warrant if such material is left on a third-party server for more than 180 days.  But that law was passed in 1986—three years before the invention of the Internet—when computer owners did not have the same systems as modern users, such as cloud hosting, Webmail, and online photo galleries.  The Email Privacy Act alters the previous rule to universally require warrants for such information. The same bill cleared the House in 2016 on an overwhelming 419-0 vote, but it stalled in the Senate.  

Source: Reuters

New Jersey Buys Police Body Cameras

February 1, 2017

Thirty-seven law enforcement agencies across New Jersey will share $566,000 in grants to buy 1,132 police body-worn cameras. The grants are being provided using funds from the U.S. Department of Justice Edward Byrne Memorial Justice Assistance Grant Program. Agencies can use up to $500 in grant funds for each camera or camera package, including camera and related equipment. Police departments in 15 of New Jersey's 21 counties received awards.

Source: NJToday

NIST to Launch Ongoing Face Recognition Vendor Test

January 31, 2017

The U.S. National Institute of Standards and Technology (NIST) will launch a new, ongoing “Face Recognition Vendor Test” beginning in February 2017.

The test will be aimed at evaluating the face recognition performance on cooperative images, as collected in civil and criminal identity management applications. NIST notes that the test will also evaluate accuracy on more difficult images, including in-the-wild and photo journalism images and noncooperative surveillance stills.

Emerging Issues for Improving the Law Enforcement Response to Domestic and Sexual Violence: Three New Reports Now Available

January 30, 2017

The Office of Violence against Women (OVW) is pleased to announce the release of several documents that address emerging issues related to improving the law enforcement response to domestic violence, dating violence, sexual assault, and stalking.  The documents reflect input from diverse stakeholders and were developed in conjunction with OVW’s national technical assistance providers.

OVW hopes that these documents and tools will be helpful for law enforcement and victim advocacy organizations across the country as they continue to work together to strengthen a coordinated community response, improve policies to respond to emerging issues, and enhance services and support for victims of sexual assault, domestic violence, dating violence, and stalking.

Source: DOJ

Pennsylvania Justice Network and Cumberland County Laboratory Information Management System Web Service Project

January 12, 2017

In Cumberland County, law enforcement and forensic laboratories have merged their recordkeeping systems, eliminating a duplication of efforts and thus, decreasing the wait time for results of forensic testing.

In 2014, the Pennsylvania Justice Network received a $250,000 grant from the Edward Byrne Memorial Justice Assistance Grant (JAG) Program to improve justice information sharing. This award was in conjunction with a $480,000 Paul Coverdell National Forensic Science Improvement award. With funding from these awards, officials developed a new laboratory management system, leveraged existing Web services, and improved the sharing of information about blood evidence between the county’s forensics lab and criminal justice agency partners.

This project is in support of the long-standing efforts by the Pennsylvania Commission on Crime and Delinquency to improve information sharing and automate data exchanges within the criminal justice system.

Source: BJA

NIST Finalizes Cyberattack Recovery Guidance

January 11, 2017

Preventing all cyberattacks is a good, but unrealistic, goal. That’s why preparing for recovery from a cyber incident can be just as important as prevention, according to the National Institute of Standards and Technology. The agency’s Guide for Cybersecurity Event Recovery provides a single resource to help organizations develop strategies to contain an opponent and restore operations quickly.

Source: GCN

BJA Funding Opportunities

January 10, 2017

The U.S. Department of Justice (DOJ), Office of Justice Programs (OJP), Bureau of Justice Assistance (BJA) has recently released a number of funding opportunities for law enforcement and criminal justice agencies, ranging from preventing and reducing intellectual property theft and related crime, to assisting agencies, to supporting agencies in employing data-driven, cross-sector strategies to reduce crime, increase trust, and improve community safety. Funding opportunities include: The Smart Policing Initiative, The Body-Worn Camera Policy and Implementation Program, The Intellectual Property Enforcement Program, The Byrne Criminal Justice Innovations Program. A complete listing of BJA’s open solicitations can be found at  

Source: BJA

Critical Infrastructure Threat Information Sharing Framework: A Reference Guide for the Critical Infrastructure Community

January 9, 2017

How are threats to critical infrastructure shared in real-time? Who is responsible for sharing threat information? To address these questions and to build a basic framework, the Department of Homeland Security (DHS) Office of Infrastructure Protection (IP) has released the Critical Infrastructure Threat Information Sharing Framework: A Reference Guide for the Critical Infrastructure Community, a resource for critical infrastructure owners and operators, as well as other private sector, federal, and state, local, tribal, and territorial government partners that share or need access to threat information.

Source: PM-ISE

Report on Law Enforcement Use of UAS

December 19, 2016

The Police Foundation has released new recommendations for local law enforcement agencies considering the use of small unmanned aircraft systems (sUAS) for public safety purposes. Community Policing & Unmanned Aircraft Systems (UAS) Guidelines to Enhance Community Trust provides guidance on all aspects of UAS use in public safety, including operational, training, and legal and regulatory compliance considerations. 

The One Thing You Need to Do Before Shopping Online: Lock Down Your Login

December 14, 2016

For millions of Americans, getting the best holiday shopping deals and discounts have become as much a part of Thanksgiving as turkey, football, or pumpkin pie.  Increasingly, that shopping takes place online, which provides a lot of conveniences but also raises the specter of scams, fraud, or identity theft. Just as consumers have migrated towards online shopping, credit card thieves have started shifting their efforts online as well. During the holidays, deeply discounted products look appealing and shoppers make quick purchasing decisions without always taking into consideration the online purchasing risks that can be present. Many Americans have had their online accounts hacked and personal information compromised because of stolen credentials or weak logins.

The White House recently launched the “Lock Down Your Login” campaign to encourage all Americans to protect themselves online with strong authentication. For more information on strong authentication and the new campaign, please visit You’ll find specific advice on how to turn on strong authentication on a variety of Web sites and services that Americans use each day.

In addition, DHS’ Stop.Think.Connect. Campaign has a number of tips and resources to help consumers protect themselves when shopping online.

Source: DHS

Video Evidence: A Primer for Prosecutors

December 13, 2016

Video Evidence: A Primer for Prosecutors was developed for the purpose of educating prosecutors on the numerous sources of video evidence, the benefits of its use in court, and challenges faced by prosecutors’ offices in the handling of video evidence. A sample process flow is included as step-by-step guidance on the procedures a prosecutor may follow when preparing and handling video evidence. This process flow corresponds to a typical case flow, from receipt of evidence through the trial. The primer also includes a glossary of terms and list of recommended resources for further reading.

Source: GLOBAL

2016 Digital Cities: Winners Focus on Transparency, Security, Infrastructure

December 12, 2016

The 2016 Digital Cities Survey results are in. Dozens of cities were selected by a judging panel at the Center for Digital Government as the most strategic, efficient, and innovative guardians of public-sector tech in the nation. The top-ranked cities will receive an award at the National League of Cities’ annual conference in Pittsburgh.

The first-place winners in five population categories are: Los Angeles, California; Virginia Beach, Viirginia; Durham, North Carolina; Roanoke, Virginia; and Tamarac, Florida. Judges evaluated the survey submissions of each city by considering 10 key characteristics of a digital city: open, mobile, engaged, collaborative, secure, staffed/supported, connected, efficient, resilient, and innovative. And the six criteria by which the responses were evaluated are: city priorities supported by ICT; demonstrated return on investment; progress over the previous year; creative/innovative approaches; effective collaboration; and successful measures of transparency, privacy, and security.

Attorney General Lynch’s Video Statement on Hate Crimes in America

December 9, 2016

Attorney General Loretta E. Lynch released a video statement today on the FBI’s newly announced 2015 Hate Crime Statistics as well as on recent media reports of alleged hate crimes and harassment around the country. The statement reminds individuals to report these incidents to both local law enforcement and the Justice Department in order to ensure that career investigators and prosecutors are able to enforce hate crime statutes at the local, state, and federal levels.

For more information on the Justice Department's efforts to combat hate crimes, please visit the Civil Rights Division Web site.

Source: DOJ

Public Safety Primer on Cloud Technology

December 8, 2016

The Public Safety Primer on Cloud Technology is a high-level primer for law enforcement and public safety communities regarding video and the cloud environment. With the quantity of video evidence now available, storage is a significant problem for record management systems and bandwidth capability. Obtaining video from a major event is often problematic for law enforcement and public safety agencies without the capability to request and store public video submissions. As such, agencies are turning to cloud environments as a solution for emergencies and major incidents to address video-related issues including storage, cataloging, conversion, and real-time analysis. Law enforcement and public safety agencies need to be educated on cloud technology for video and versed on associated considerations, particularly as more vendors enter this field. Responsively, the Public Safety Primer on Cloud Technology was developed as an easy-to-read frequently asked questions (FAQ) guide, answering common questions in a straightforward manner. It features information on the services that cloud environments can provide as well as guidance for agencies considering contracts with cloud vendors. In addition, this product includes a glossary of cloud terminology and a list of recommended resources for further reading. Perhaps, most importantly, this resource includes critical information on privacy, security, and data ownership.

Source: GLOBAL

Justice Department Releases Intake and Charging Policy for Computer Crime Matters

December 7, 2016

As computers play an ever-greater role in our lives and cybercrime becomes both more commonplace and more devastating, the need for robust criminal enforcement of effective computer crime laws will only become more important.  As we said in public remarks last year, we urgently need targeted updates to the Computer Fraud and Abuse Act that will help the department protect our privacy and security online.  A number of recent prosecutions have demonstrated our commitment and success in bringing significant prosecutions under these vital statutes.  Prosecutors in U.S. Attorneys’ Offices across the country, in conjunction with the Computer Crime and Intellectual Property Section (CCIPS) in Washington, have brought cases against hackers and carders like Roman Seleznev and Marcel Lazar and cyber stalkers and sextortionists like Ryan Vallee and Michael Ford, and have conducted challenging and cutting-edge cybercrime operations, such as the takedown of the Darkode hacking forum last year.

It is, of course, not enough to have effective laws; those laws must also be enforced responsibly and consistently.  It is also important that the public understand how the department applies the law in this context.  In order to further that goal, the Criminal Division, primarily through CCIPS, has been sharing its knowledge about cybercrime and the laws that impact cybersecurity for two decades.  We have convened public-private partnership eventspublished public manualstestified numerous times before Congress on threats such as ransomware, participated in and recently hosted[external link] symposia and released Best Practices for Victim Response and Reporting of Cyber Incidents.  Many of these materials, as well as press releases related to computer crime and intellectual property prosecutions, are available at

Source: DOJ

University of Maryland to Begin Using Gunshot Detection Technology on Campus

December 6, 2016

The University of Maryland recently began using the ShotSpotter gunshot detection system as a potential deterrent to active shooter situations on campus. The ShotSpotter system instantly detects gun shots and sends a map to dispatchers so they know where shots were fired. The university has already installed ten sensors around campus. ShotSpotter has previously been deployed in a number of major U.S. cities.

Source: Fox5dc

Secretary Johnson Participates in President’s Interagency Task Force to Monitor and Combat Human Trafficking

December 5, 2016

Secretary of Homeland Security Jeh Johnson participated in the annual meeting of the President’s Interagency Task Force (PITF) to Monitor and Combat Human Trafficking at the White House. The PITF works to provide a whole-of-government response to the heinous crime of human trafficking. As part of the Task Force, the U.S. Department of Homeland Security (DHS) works to combat human trafficking through a victim-centered approach. 

At the meeting, Secretary Johnson discussed the progress that DHS has made in combatting human trafficking over the past fiscal year, as well as throughout the course of this Administration.  The Blue Campaign, created in 2010 to serve as the Department’s unified effort to combat human trafficking, coordinates these important efforts.

In FY2016, the Blue Campaign entered into more formal partnerships than in any other year in Blue Campaign’s history. Partners such as the District of Columbia, the Virginia Office of the Attorney General, and the City of Los Angeles are now bringing awareness materials and training opportunities to local communities from coast to coast.

Source: DHS Opens Its Source Code

November 15, 2016

Like the new Website? If you’re a software developer or a municipal Website manager, you can build your own version by grabbing the freely available source code and tweaking as you see fit. The city’s Digital Team just released the entirety of its source code on GitHub so that developers can continue to enhance the site and other cities can benefit from it.

Source: GCN

FBI’s Cyber Investigation Certification Program

November 14, 2016

The Federal Bureau of Investigation (FBI), in partnership with Carnegie Mellon University, the FBI’s Cyber Division, and the International Association of Chiefs of Police (IACP), has developed the new Cyber Investigation Certification Program (CICP).  The self-guided online program is available to all federal, state, local, tribal, and territorial (SLTT) law enforcement personnel on the FBI’s Law Enforcement Enterprise Portal (LEEP).   Each course in the program has an assessment at the end of the training, and, upon successful completion of each course, participants will receive a course certificate.  The first responder course is available now, and additional courses are in planning and development. 

Source: FBI

IACP Releases New Law Enforcement Benchmarking and Performance Analytics Portal

November 10, 2016

Data helps drive better, more informed decision making.  With this in mind, the International Association of Chiefs of Police (IACP) and IACP NET partnered with the Community Oriented Policing Services (COPS) Office to create the new Law Enforcement Benchmarking and Performance Analytics Portal.  The secure Benchmark Portal enables law enforcement agencies to conduct comparative analyses with peer agencies.  Agency representatives can visit the portal and input their agency’s information and immediately query and visualize the results.  The tool is free for participating law enforcement agencies, and access is restricted to law enforcement agency representatives only.  Additional information, including an informational flyer and a PDF version of the portal questions, is available on the main Benchmark Portal Web site.

Source: IACP

California Shares Cybercrime Services With Local Law Enforcement

November 9, 2016

The California Cyber Crime Center (C4), a newly minted forensic and digital crimes group based in Fresno, California, that as of October 11, unifies the California Department of Justice's (DOJ) resources to investigate and prosecute cybercrime, enhance digital evidence capabilities, and promote innovation.  C4 supports DOJ internally as well as local and state law enforcement agency partners throughout the cybercrime lifecycle by providing services, technical assistance, and training related to cybercrime, digital evidence, and digital forensics.  One example of support that C4 offers is the Cyber Response Vehicle (CRV), which serves as a mobile cyber laboratory, allowing multiple staff to work as if they were in the computer lab to collect, acquire, and process loose media, mobile devices, personal computers, servers, and other sources of electronically stored information during the course of an investigation.  

White House Opens Repository

November 8, 2016

The White House has opened a new source code resource to share a trove of custom software developed for federal projects. Federal CIO Tony Scott wrote in a Nov. 3 blog post that the newly opened is a follow-on to this past summer's White House federal open source policy aimed at improving agency sharing of federally developed software source code.

Source: FCW

FBI’s Next Generation Identification (NGI) System

November 7, 2016

The term “biometrics” is not limited to fingerprints—it also includes palm prints, irises, and facial recognition.  In an effort to harness new technologies and to improve the application of tenprint and latent fingerprint searches, the Federal Bureau of Investigation’s (FBI) Criminal Justice Information Services (CJIS) Division has established a new system, the Next Generation Identification (NGI), to replace the Integrated Automated Fingerprint Identification System (IAFIS).  The NGI provides the criminal justice community with the world’s largest and most efficient electronic repository of biometric and criminal history information. 

Source: FBI

How LA’s Security Center Combats Cyberthreats

November 4, 2016

In the past year, the city of Los Angeles has seen the number of cyberattacks launched against it grow by 250 percent—and that’s a good thing. Spotting so many incidents means that city officials are able to detect and mitigate them before they become major problems.  This capability is largely the result of the city’s Integrated Security Operations Center (ISOC). Completed on August 1, 2015, ISOC is the culmination of a two-year physical and virtual project to consolidate more than 200 million log records and data every 24 hours.

Source: GCN

IACP Assessment of IL3CP Shows Promising Results

October 12, 2016

Intelligence-Led Community Policing, Community Prosecution, and Community Partnerships (IL3CP) is a unique approach to community policing that extends community partnerships to include prosecutorial and community service organizations along with law enforcement. This new model connects the criminal justice system and the community through seamless communication and partnerships.

IL3CP, developed by the Rockland County, New York, District Attorney’s Office (RCDAO), synthesizes three contemporary law enforcement concepts into a collaborative approach to crime reduction. In an effort to explore the effectiveness of IL3CP, the IACP worked with law enforcement and prosecutors in Mesa, Arizona; Newport News, Virginia; and Saint Paul, Minnesota, to replicate the IL3CP concept.

In the detailed project report available today, this approach showed promising results for being a collaborative and unifying response to crime and community problems by strengthening relationships between citizens and law enforcement. While the complexity of the project did not allow for a comprehensive program evaluation, all pilot sites experienced positive results and voluntarily expanded the IL3CP concept to additional communities within their jurisdictions.

Source: IACP

House Passes Bill to Make It Easier for First Responders to Acquire New Technologies

October 10, 2016

The First Responder Access to Innovative Technologies Act (H.R. 5460), which requires the Federal Emergency Management Agency (FEMA) to develop a transparent process to review requests by first responders to use their Urban Area Security Initiative or State Homeland Security Grant Program funds to purchase equipment for which voluntary industry standards do not exist.

Introduced by Representative Donald M. Payne, Jr. (NJ-10), ranking member of the House Committee on Homeland Security Subcommittee on Emergency Preparedness, Response, and Communications, the legislation would make it easier for first responders to acquire new equipment and technologies they need to respond to evolving threats.

The bill, which now goes to the Senate, was praised by House Speaker Representative Paul Ryan’s (R-WI) office as a “commonsense step to help our first responders stay ahead of the curve when dealing with new threats.”

Source: HSToday

National Cyber Security Awareness Month

October 7, 2016

October is National Cyber Security Awareness Month (NCSAM), which is an annual campaign to raise awareness about cybersecurity. We live in a world that is more connected than ever before. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. NCSAM is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident.

NCSAM 2016 Weekly Themes

Week 1: October 3-7, 2016 – Every Day Steps Towards Online Safety with Stop.Think.Connect.™

Week 2: October 10-14, 2016 – Cyber from the Break Room to the Board Room

Week 3: October 17-21, 2016 – Recognizing and Combating Cybercrime

Week 4: October 24-28, 2016 – Our Continuously Connected Lives: What’s Your ‘App’-titude?

Week 5: October 31, 2016 –Building Resilience in Critical Infrastructure

Please visit the NCSAM Resources page to find the 2016 NCSAM One Pager with information about the weekly themes.

Source: DHS

National Fusion Center Association and the Electricity Information Sharing and Analysis Center Rapid Deployment Project

October 7, 2016

The Office of the Program Manager for the Information Sharing Environment (PM-ISE) is working with the National Fusion Center Association (NFCA) and the Electricity Information Sharing and Analysis Center (E-ISAC) to consider using the national fusion center network as a way to convene electrical infrastructure subject-matter experts who need rapid access to classified data or communications systems in the event of an emergency situation.  This effort also has the potential to develop into a long-term information exchange relationship between the energy sector and fusion centers to provide situational awareness of threats and vulnerabilities in their areas of responsibility.  


Source: ISE

Directory of Cybercrime Labs and Resources

October 6, 2016

The Law Enforcement Cyber Center (LECC) is designed to assist police chiefs, sheriffs, commanders, patrol officers, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.  The site also includes resources on training, technical assistance, and other critical information, including a comprehensive directory that allows law enforcement to connect with cybercrime experts and practitioners across the United States.  This search tool enables visitors to identify and contact local, regional, and national organizations (both private and government) that offer cyber-related services and assistance to law enforcement officials and prosecutors, for example, cybercrime units, training facilities, fusion centers, and forensic labs.  Searches may be conducted using zip code, state, keyword, or areas of expertise. 


Ocoee Police Improves Crime Analysis With New Software

October 5, 2016

For a yearly subscription cost of approximately $700, the Ocoee Police Department has begun subscribing to Internet-based software that allows officers to create their own area-specific crime maps. For example, a patrol sergeant could use the tool to improve duty assignments in a specific area. Also, area residents can use an interactive feature on the Web site to search the database and to set up personalized text alerts. 

Source: Orange Observer

Responder News: 2016 National Preparedness Report Highlights Emergency Response Collaboration

October 4, 2016

This spring, the Federal Emergency Management Agency issued its 2016 National Preparedness Report which evaluates core capabilities of U.S. government agencies tasked with providing emergency preparedness and response. The findings monitored progress from the last five years with a primary focus on five mission areas: prevention, protection, mitigation, response, and recovery.

The report highlighted several U.S. Department of Homeland Security (DHS) initiatives, programs, and case studies that demonstrate the department’s interagency collaborative efforts and cross-discipline programs to better prepare emergency first responders for a wide range of situations.

The shared intelligence will allow emergency managers to build on lessons learned and identify a path forward. For example, DHS and interagency partners continue to build on work that began in 2012 to enhance the capabilities of the National Network of Fusion Centers to collect and share intelligence among fusion center customers.

Source: DHS

U.S. Department of Justice Awards Over $20 Million to Law Enforcement Body-Worn Camera Programs

October 3, 2016

The U.S. Department of Justice has announced awards totaling over $20 million to 106 state, city, tribal, and municipal law enforcement agencies to establish and enhance law enforcement body-worn camera programs across the United States. The awards, funded under the Office of Justice Programs' Bureau of Justice Assistance's (BJA) Fiscal Year 2016 Body-Worn Camera Policy and Implementation Program, will help law enforcement organizations implement body-worn camera policies, practices, and evaluation methods to make a positive impact on the quality of policing in individual communities. Under this grant announcement, BJA awarded over $16 million to state, local, and tribal law enforcement agencies, as well as a $3 million supplemental award to continue support for body-worn camera training and technical assistance. 

Source: DOJ

FBI Releases Materials on N-Dex System

September 30, 2016

The Federal Bureau of Investigation (FBI) Criminal Justice Information Services (CJIS) Division has released a fact sheet and a brochure on its N-DEx System. Since its inception in 2008, the N-DEx System has grown to include data from thousands of law enforcement and criminal justice data sources, and is available at no cost to agencies or users wishing to search the hundreds of millions of records available through the system or participate by sharing their data. The investigative nature of the system is a force-multiplier, allowing agencies to access even more data in less time and make connections between seemingly unrelated information not previously available.

You can download the brochure from and the fact sheet from

Source: FBI

Somerset Police Create Database of Surveillance Cameras

September 19, 2016

A community is joining forces with its police department to help combat crime.

Somerset police are asking residents and businesses to register their surveillance cameras with the department.

"You see that a lot of these crimes that go onwhether they're robberies, burglaries, whatever they arethey're being solved by surveillance camera footage," Police Chief George McNeil said.

That's why McNeil enacted the Somerset Camera Registry Program. Think of it as a database, simply a way to allow police to more quickly access footage in areas where crimes may have occurred.

Source: turnto10

Take the Safe Online Surfing Internet Challenge: Available Soon for 2016-2017 School Year

September 16, 2016

What do more than 870,000 students across the nation have in common?

Since 2012, they have all completed the FBI’s Safe Online Surfing (SOS) Internet Challenge. Available through a free Web site at, this initiative promotes cyber citizenship by teaching students in third through eighth grades how to recognize and respond to online dangers through a series of fun, interactive activities.

Now entering its fifth season, the FBI-SOS program has seen increased participation each year. From September 2015 through May 2016, nearly a half-million students nationwide finished the activities and took the exam. We look forward to even more young people completing the program in the school year ahead. The challenge begins September 1.

Source: FBI

ISE Reports Accomplishments, Identifies Goals in 2016 Annual Report

September 14, 2016

The Information Sharing Environment (ISE) reported the continued progress of terrorism-related information sharing and identified goals for the coming year in the recently released 2016 ISE Annual Report to the Congress.

The ISE is the central initiative to strengthen responsible information sharing across communities, agencies, and levels of government to implement goals set forth by President Obama in the 2012 National Strategy for Information Sharing and Safeguarding (NSISS). Over the past year, information sharing has advanced across state and regional ISEscybersecurity information sharingdomain awarenessinteroperabilitysensitive but unclassified information sharingidentity, credential, and access management; and countering violent extremism.

Source: PM-ISE

2016 IJIS Institute Mid-Year Briefing

September 12, 2016

The IJIS Institute's Mid-Year Briefing on September 1416, 2016, in Arlington, Virginia, is a must-attend conference focused on technology, information sharing, and safeguarding standards.  Connect with technology executives and leaders from industry and government at this unique event and engage in constructive dialogues about technology trends, issues, and solutions. 

Source: IJIS

NICS, A Communication Platform for First Responders, Now Available Worldwide

September 9, 2016

The U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has announced the Next-Generation Incident Command System (NICS), an information sharing tool for first responders, is now available worldwide.

NICS is a mobile, Web-based communication platform that enables responders on scene at a developing incident to request and receive assistance from remote experts, such as a university researcher or topographic expert, in real time. Conversely, experts can observe an evolving situation and volunteer relevant material or resources.

Source: Newswise

Victimized by a Cyber Scammer? Don’t Forget to File a Complaint With the IC3

August 25, 2016

The FBI is putting a more public face on its Internet Crime Complaint Center (IC3) with a billboard campaign to increase awareness of the center as a mechanism for reporting suspected Internet crime to the FBI.  FBI field offices taking part in the billboard campaign also participate in Operation Wellspring.  Through that project, local law enforcement agencies can tap the FBI's complaint database and its analytical capabilities to create intelligence packages for their geographic regions, including local criminal enterprises and criminals. The FBI said that the database can link different methods of criminal operations back to allied or central organizations and sniff out layers of criminal activities.

Source: FBI

MAGLOCLEN Proudly Announces the Indiana Intelligence Fusion Center’s Connection to RISSNET

August 24, 2016

The Middle Atlantic-Great Lakes Organized Crime Law Enforcement Network (MAGLOCLEN) is pleased to welcome the Indiana Intelligence Fusion Center (IIFC) to the group of partner-agency systems connected to RISSNET, sharing criminal intelligence information via RISSIntel.  The IIFC intelligence database is now available for real-time, online searching.  The Northeast Fusion Center Intelligence Project aims to implement the ability of fusion centers in the northeast region to utilize their existing intelligence system by connecting to RISSIntel, which is accessible via RISSNET and currently provides for the real-time, online search of more than 35 state, regional, and National Virtual Pointer System (NVPS) participant-agency connected systems simultaneously without requiring users to log on to separate, individual systems.  

Source: PM ISE

Readout of DHS Secretary Johnson's Call With State Election Officials on Cybersecurity

August 23, 2016

Secretary of Homeland Security Jeh Johnson hosted a phone call with members of the National Association of Secretaries of State (NASS) and other Chief Election Officials to discuss the cybersecurity of the election infrastructure. It is critically important to continue to work to ensure the security and resilience of our electoral infrastructure, particularly as the risk environment evolves. Representatives from the U.S. Election Assistance Commission, the U.S. Department of Commerce's National Institute for Standards and Technology (NIST), and the U.S. Department of Justice (DOJ) also participated in the call.

During the call, Secretary Johnson offered assistance in helping state officials manage risks to voting systems in each state's jurisdiction. While DHS is not aware of any specific or credible cybersecurity threats relating to the upcoming general election systems, Secretary Johnson reiterated that DHS, the Election Assistance Commission, NIST, and DOJ are available to offer support and assistance in protecting against cyber attacks. He also recognized the important work already being done in the states to ensure the integrity and security of the nation's elections.

As part of the ongoing effort, the Secretary also announced that DHS is convening a Voting Infrastructure Cybersecurity Action Campaign with experts from all levels of government and the private sector to raise awareness of cybersecurity risks potentially affecting voting infrastructure and promote the security and resilience of the electoral process. 

Source: DHS

Urban Institute Justice Policy Center Releases State Breakdown on Body-Worn Camera Policy

August 22, 2016

Public support for police body-worn cameras has increased after several high-profile shooting deaths in the United States. Several states are considering passing or have already passed legislation to address policy concerning body-worn cameras. Many states are grappling with how to strike a balance between privacy and transparency. The Urban Institute’s Justice Policy Center has released a new state-by-state breakdown looking at where states are and where they are headed.

Source: Urban Institute

Hawaii Becomes First U.S. State to Place Gun Owners on FBI Database

August 9, 2016

Hawaii's governor signed into law a bill on June 23, 2016, making it the first state to place its residents who own firearms in a federal criminal record database and monitor them for possible wrongdoing anywhere in the country.  The Federal Bureau of Investigation database called "Rap Back" will allow Hawaii police to be notified when a firearm owner from the state is arrested anywhere in the United States.  The law could affect gun owners outside Hawaii, because the state requires visitors carrying guns to register.

Source: Reuters

Cybersecurity Resources for State and Local Law Enforcement

August 8, 2016

The National Consortium for Advanced Policing (NCAP) recently released the Cybersecurity Guide for State and Local Law Enforcement and an accompanying issue brief: A Policy Roadmap to Enhance Capabilities.  The guide was created to help state and local law enforcement agencies protect themselves, as well as businesses and community members, from cyber-related threats.  The issue brief is a companion to the guide and focuses on how policymakers at federal, state, and local levels, in both the executive and legislative branches of government, can take steps to improve the cyber authorities and capabilities of state and local law enforcement.

The guide is available at

The issue brief is available at

The LECC Web site, including the resources mentioned above, is available at


FLETC Cybercrime Conference

August 5, 2016

In the 21st century, technology is ingrained into the fabric and function of our society. But the larger the role technology plays in our lives, the more opportunities unscrupulous individuals, criminal organizations, and those acting in bad faith have to commit cyber-related crimes. Given this threat, our law enforcement professionals are faced with the challenge of investigating crimes in a space where technology is constantly changing. Consequently, the knowledge of how to best combat cybercrime can become quickly perishable.

The U.S. Department of Homeland Security is committed to making the fight against cybercrime a priority. The Federal Law Enforcement Training Center recently hosted its inaugural Cybercrime Conference. The conference brought together more than 150 cybercrime subject-matter experts from academia, private industry, and the federal, state, local, and tribal law enforcement communities to exchange ideas and best practices at FLETC’s headquarters in Glynco, Georgia.

Source: DHS

DHS Releases Revised National Terrorism Advisory System Bulletin

July 22, 2016

In the aftermath of the June 12 shooting at the Pulse nightclub in Orlando, the U.S. Department of Homeland Security has issued a revision to its National Terrorism Advisory System (NTAS) Bulletin, which promotes public vigilance and awareness. The bulletin describes the government's counterterrorism efforts and ways in which the public can be prepared and stay informed. Individuals are urged to report suspicious activity to local law enforcement.

Source: NCCPSafety

Securing Our Communities: Resources for Small and Medium Businesses

July 21, 2016

The recent shooting in Orlando, Florida, reminds all Americans that the threat of violence exists in our communities. The ideology or motivation behind each attack may vary, but in common we have seen an evolution toward more independent, unaffiliated attacks inspired by extremist groups. Extremist individuals can find inspiration and encouragement through social media with geographically dispersed but like-minded extremists.

These tragedies often leave people, and particularly business owners or those organizing public events, wondering what they can do. The U.S. Department of Homeland Security’s Hometown Security initiative was created to share tools and resources for small and medium size businesses as well as people who organize public gatherings that extremists may consider appealing and easily accessible targets. Through this initiative, we encourage community partners to Connect. Plan. Train. Report.

  • Connect with a local Protective Security Advisor or first responder
  • Plan for emergencies, including active shooters
  • Train your employees and exercise your plans
  • Report suspicious activities
Source: DHS

2016 National Forum on Criminal Justice: Integrating Policy, Research, and Technology to Improve Public Safety

July 20, 2016

Sponsored by the National Criminal Justice Association (NCJA), the Justice Research and Statistics Association (JRSA), and the IJIS Institute (IJIS), the National Forum on Criminal Justice showcases programs, research, and technologies that help justice practitioners and decision makers in states, local communities, and tribal nations address pressing public safety issues. It is the only criminal justice conference that brings together leaders from federal, state, local, and tribal government and the public and private sector to share real-world strategies and solutions from around the country. 

The 2016 National Forum will be held August 7-10 at the Loews Philadelphia Hotel in Philadelphia, PA.

Source: NCJA

New York's Top Cop Embraces Smartphone Revolution

July 7, 2016

The New York Police Department has implemented a $160 million mobility initiative that equips all 36,000 officers with a smartphone and every patrol car with a tablet computer. Further plans call for use of body-worn cameras, gunshot sensors, and surveillance cameras. Commissioner Bill Bratton has stated that officers are able to respond more quickly, and he has offered to share the city's software and statistical models with interested departments. 

Source: FT

Orlando Crime Scene Video Analysis Goes High-Tech With $1.3 Million Grant to UCF

July 6, 2016

A $1.3 million grant from the National Institute of Justice is funding a new two-year project that may revolutionize the way police monitor and analyze crime scene surveillance video footage with technology developed at the University of Central Florida (UCF).

For the first time, UCF computer scientists will develop and test computer vision technology that will automate the process of monitoring and reviewing thousands of hours of video streams fed-in from multiple cameras.

FBI Hosts Meeting of International Law Enforcement Group

July 5, 2016

Director James Comey is hosting a meeting of the Five Eyes Law Enforcement Group (FELEG), an international coalition of law enforcement agencies from Australia, Canada, New Zealand, the United Kingdom, and the United States who share criminal intelligence and collaborate on operations to combat transnational crime.

Members of the FELEG include representatives from the FBI, Drug Enforcement Administration (DEA), Immigration and Customs Enforcement (ICE), Australian Commission, Australian Federal Police, Royal Canadian Mounted Police, the U.K. National Crime Agency, and the New Zealand Police. Within the FBI, the FELEG’s operational point of contact is Associate Executive Assistant Director David J. Johnson from the Criminal, Cyber, Response, and Services Branch.

Source: FBI

Helping Victims of Mass Violence and Terrorism: Creating a Victim Assistance Plan

July 1, 2016

This month, the Office for Victims of Crime Training and Technical Assistance Center (OVC TTAC) will launch a new multimedia Web training series to introduce the Web-based toolkit Helping Victims of Mass Violence and Terrorism: Planning, Response, Recovery, and Resources to civic, government, and business sectors that are interested in developing a comprehensive victim assistance plan. Lessons learned from past incidents indicate that with advanced planning (including establishing victim assistance protocols) and developing and maintaining multidisciplinary partnerships, communities are better prepared to engage a holistic approach to victim assistance to ensure that each victim's needs are met. The Web training will provide an in-depth overview of partnerships, planning, response, and recovery.

Source: OVC

Violent Criminal Apprehension Program Part 2: The Highway Serial Killings Initiative

June 30, 2016

To raise awareness among law enforcement agencies—and the public—about highway serial killings and to focus ViCAP resources on helping to solve these cases, in 2004 the FBI began the Highway Serial Killings (HSK) Initiative, with support from the trucking industry.

Without ViCAP—part of the FBI’s National Center for the Analysis of Violent Crime—local law enforcement agencies investigating one of these cases may have no way of knowing a murder in their jurisdiction is similar to killings committed elsewhere. Since the initiative began, ViCAP analysts have compiled a list of more than 750 murder victims found along or near U.S. highways, as well as nearly 450 potential suspects.

The database is constantly monitored for cases that meet the HSK criteria. When cases are identified, ViCAP analysts can provide information to local law enforcement agencies regarding these cases—anything from timeline data to advice on what records to subpoena to suggesting a point of contact at another police department with similar cases.

Source: FBI

Addressing the Challenges of Maintaining a Robust State and Regional Information Sharing Environment

June 29, 2016

As a means of monitoring and advancing the priority actions identified during the 2015 “Addressing the Challenges of a Robust State and Regional Information Sharing Environment: A Summit of State Policy Leaders,” an Implementation Working Group (IWG) was established.  IWG members include representatives from the National Criminal Justice Association (NCJA), the Association of State Criminal Investigative Agencies (ASCIA), the International Association of Chiefs of Police (IACP) Division of State and Provincial Police (S&P), the Institute for Intergovernmental Research (IIR), and the IJIS Institute and are supported by the Office of the Program Manager for the Information Sharing Environment (PM-ISE).

A summary of the “Priorities for Action” was identified during the summit with the progress to date.

Source: PM-ISE

Fiscal Year 2017 Commerce, Justice, Science Funding Bill Released

June 3, 2016

The House Appropriations Committee released the fiscal year 2017 Commerce, Justice, Science (CJS) Appropriations bill, which will be considered in subcommittee. The bill funds the Departments of Commerce and Justice, the National Aeronautics and Space Administration (NASA), the National Science Foundation (NSF), and other related agencies.

The legislation contains $56 billion in total discretionary funding, an increase of $279 million over fiscal year 2016 and $1.4 billion above the President’s request for these programs. The bill targets these increases to programs of national importance, such as federal law enforcement, national security (including cybercrime and counter-terror activities), economic development, illegal drug efforts, trade enforcement, and space exploration programs. The bill also includes legislative provisions to protect the Constitutional rights of all Americans and to limit bureaucratic overreach.

SEARCH Offers Resource for Developing Common Charge Tables

June 2, 2016

As system interoperability grows, it is important for justice stakeholders to share charge information in order to improve the overall accuracy of the respective data systems involved in the justice process.

However, the justice community has developed multiple ways to represent and describe offenses in their data systems—in fact, such terms as “offenses,” “crimes,” and “charges” are often used interchangeably. These differences underscore the need to align charge data between data systems.

SEARCH has prepared a new Technical Brief as a resource to stakeholders seeking to develop common charge tables. It analyzes a collection of common charge tables used in six states to determine the core elements a charge table should include and identifies appropriate NIEM elements for each.

Source: SEARCH

IACP Launches New Leading by Legacy Online Resource Toolkit

June 1, 2016

The International Association of Chiefs of Police's (IACP) Leading by Legacy program began in 2009 and held its first training in July of 2010. The Leading by Legacy training course is an intensive and interactive 2.5 day event covering a host of leadership and management topics. One of the foundational elements of the Leading by Legacy program is the Leading by Legacy Resource Toolkit. Initially available via CD-ROM, the toolkit was limited in its ability to quickly update and meet the ever-changing challenges of today’s smaller departments.

With the support of the U.S. Department of Justice, Bureau of Justice Assistance (BJA), we are pleased to announce the launch of our new Leading By Legacy Online Resource Toolkit! This online toolkit provides first line supervisors, command staff, and police executives with information that will aid in their individual, organizational, and community legacies. The resources provided in this toolkit are intended to increase leadership skills, promote departmental stability, and facilitate community needs in smaller agencies. The online toolkit also features resources used and developed by Leading by Legacy trainers and advisors.

Source: IACP

Privacy, Civil Rights, and Civil Liberties Remain Important for the Future of Cybersecurity Information Sharing

May 31, 2016

Privacy, civil rights, and civil liberties (P/CRCL)as they relate to the public and private spaceare increasingly woven into the work of countering terrorism and violent extremism. P/CRCL also plays an important role in cybersecurity conversations. The Intelligence Reform and Terrorism Prevention Act of 2004 created the Information Sharing Environment (ISE) with a mandate to share terrorism-related information “in a manner consistent with national security and with applicable legal standards relating to privacy and civil liberties.” As a result, the ISE recognizes that the exchange of sensitive information comes with the responsibility to understand evolving privacy concerns and to identify policy challenges and institutional best practices that apply to this environment.

At the 2016 International Association of Privacy Professionals Global Privacy Summit in Washington, DC, the nexus between cybersecurity and P/CRCL was a central theme. As noted by Marc Groman, Senior Advisor for Privacy at the Office of Management and Budget and Chair of the Federal Privacy Council, privacy and cybersecurity efforts require coordination and are “independent but interdependent.” Cybersecurity programs implemented by ISE partners should incorporate the principals of Privacy by Design by ensuring that privacy is considered at all stages during the program design process.

Source: PM-ISE

Violent Criminal Apprehension Program Part 1: Sharing Information to Stop Serial Offenders

May 27, 2016

FBI crime analysts recently provided training on the Bureau's Violent Criminal Apprehension Program (ViCAP) Web platform in Scottsdale, Arizona.

Personnel from regional law enforcement agencies were gathered in Scottsdale, Arizona, for an introduction to the FBI’s ViCAP, whose mission is simple: share information to help solve serial crimes. ViCAP Web is the only national law enforcement database that contains both investigative and behavioral information related to specific types of cases. 

Source: FBI

New Jersey Takes Consolidated, Fusion Center-Style Approach to Cybersecurity

May 26, 2016

In post-9/11 America, states have accepted more responsibility in protecting their citizens. And as the firm grip of technology tightens around our daily lives and the most basic operations of government, one state is stepping up to the proverbial plate as a leader in the cybersecurity field.

The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) took root within the state’s Office of Homeland Security and Preparedness (NJOHSP) as a counterpunch to the escalating online threats posed by a widening cast of bad actors. The mission: Find the threats, mitigate the threats, and share the intelligence gathered in the process with everyone else.

According to Chief Information Security Officer Dave Weinstein, the statewide program is modeled after the Department of Homeland Security National Cybersecurity Communications Integration Center (NCCIC) and leverages a multi-pronged strategy to head off potentially damaging attacks.

Building Bridges in the Ocean State: Automating Privacy Policy Enforcement to Enable Information Sharing

May 16, 2016

A May 24, 2016, Webinar will be hosted to share how Rhode Island automated privacy policy and access controls in a cross-boundary juvenile criminal history exchange.  Learn about this first use-case of electronic privacy automation using the Global Reference Architecture (GRA) and the Global Privacy Technical Framework for sharing information across domains.

Source: NCSC

ICE Participates in Europol-Led Effort to Identify Victims of Child Abuse

May 12, 2016

Victim identification specialists from U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) have been working with top experts from around the globe at Europol’s headquarters in The Hague to work unsolved cases in an effort to identify victims of child sexual abuse and exploitation. The coordinated effort of this Europol Victim Identification Task Force (VIDTF) yielded significant results: More than 250 series of child sexual abuse images and video files have been uploaded to the INTERPOL International Child Sexual Exploitation Database and additions made to more than 300 existing series.

Source: ICE

Department of Justice Releases the 2016 National Strategy for Child Exploitation Prevention and Interdiction

April 28, 2016

The U.S. Department of Justice has released the 2016 National Strategy for Child Exploitation Prevention and Interdiction.  The report provides a comprehensive threat assessment of the nature and scope of the current dangers facing our nation’s children and, for the first time, dedicates an entire section to the unique challenges confronting child exploitation in Indian Country.  It examines existing efforts, assesses new threats, and highlights innovative ways in which the federal government and its partners can address child exploitation.

Source: DOJ

New Jersey Cybersecurity and Communications Integration Cell (NJCCIC): Information Sharing Success at the State and Local Level

April 27, 2016

The smart government model of partnerships among and across federal, state, local, tribal, and territorial stakeholders across the Information Sharing Environment (ISE) has been in existence for over a decade for a very good reason:  collaboration allows faster information sharing at all levels of government by fostering the quick dissemination of vital information to partners responding to critical incidents, from cyberattacks to terror plots.  Read more about the NJCCIC, a shining example of this collaborative approach.  Also, visit the NJ Cybersecurity site for a range of cyber resources.  

Source: PM-ISE

Hacker Lexicon: What Are White Hat, Gray Hat, and Black Hat Hackers?

April 22, 2016

After much speculation over who provided the Federal Bureau of Investigation with a solution for hacking into the San Bernardino shooter’s iPhone, The Washington Post reported this week that it was a “gray hat” hacker who assisted the agency.  There are three types of hackers: white hats, black hats, and gray hats—ranging from helpful to criminal.

Cyber resources are available at

Source: WIRED

FLETC Announces Cybercrime Conference

April 21, 2016

The Federal Law Enforcement Training Center (FLETC) in Glynco, Georgia, is hosting the FLETC Cybercrime Conference on July 68, 2016.  The purpose of this event is to foster education and awareness of the current threats and innovations that may impact today’s law enforcement officers and the manner in which they deal with cybercrime. The intent is to educate investigators with exhibits, lectures, demonstrations, and hands-on labs. During the conference, attendees will have the opportunity to collaborate with other FLETC training division staff and partnering organizations, as well as vendors.

Source: FLETC

Cyber Training for Law Enforcement Call to Action Flyer

April 12, 2016

The Global Justice Information Sharing Initiative developed a flyer to help raise awareness of the need for state, local, tribal, and territorial law enforcement leaders to ensure that appropriate agency personnel receive cybercrime training.  The two-page flyer highlights several no-cost, federally sponsored cybercrime training opportunities available to law enforcement and partners. 

Source: GLOBAL

Criminal Intelligence Coordinating Council Helps Law Enforcement Share Information and Intelligence to Prevent Crime and Terrorism

April 11, 2016

The Criminal Intelligence Coordinating Council (CICC) supports state, local, and tribal law enforcement and homeland security agencies in developing and sharing criminal intelligence and information nationwide.  The effective sharing of criminal intelligence is essential to prevent not only criminal activity but terrorism-related events as well.  Since 2001, numerous efforts and initiatives have been developed to improve law enforcement’s ability to share information and intelligence.  These efforts include the national fusion center initiative, the Nationwide Suspicious Activity Reporting Initiative, and the continued implementation of intelligence-led policing. 

Source: PM-ISE

40th Annual LEIM Training Conference and Technology Exposition

April 8, 2016

The 40th Annual IACP Law Enforcement Information Management (LEIM) Training Conference and Technology Exposition is scheduled for May 2325, 2016,  in Dallas, Texas. IACP's LEIM Training Conference and Technology Exposition provides chiefs, IT managers, technology specialists, criminal justice practitioners, researchers, and industry-leading solution providers with a forum in which to share information, best practices, and lessons learned in law enforcement information management.

The LEIM Conference features a mix of plenary sessions and concurrent workshops that are organized in Executive, Operational, and Technical tracks. In addition to the formal educational program, the conference also includes a Technology Exposition which typically features 60–70 exhibits from industry-leading solution providers and corporate sponsors.

Source: IACP

NASCIO and NIEM Working Together: Advancing Information Exchange Efforts Across All Levels of Government

April 8, 2016

On April 12, 2016, from 2:00 p.m. to 3:00 p.m., ET, the National Association of State Chief Information Officers (NASCIO) will host a Webinar with the National Information Exchange Model (NIEM) Program focused on familiarizing the state and local audience with NIEM and how it can help them. During the hour-long Webinar, NASCIO and NIEM will discuss ways to advance information sharing across all levels of government and announce the 2015 Best of NIEM Winners. Please find more information here.

Source: NASCIO

Coordinating Cybersecurity Programs

April 7, 2016

Cyberattacks, resilience of critical infrastructure, and related cybersecurity concerns are escalating at exponential rates and so are the many governmental programs attempting to mitigate the risks for all citizens as well as government and industry. As a wide range of threats expand, and cyberterrorists, cybercriminals, and other nefarious actors transform their capabilities into new forms of attack, the demand for faster and more effective responses and ways of prevention grow as well. Cybersecurity programs are in place throughout many federal agencies, state/local organizations, and consortia, and the Office of the Program Manager for the Information Sharing Environment is prioritizing its efforts on cyber information sharing efforts that focus on the domestic nexus of national security and public safety.

Recently, the Criminal Intelligence Coordinating Council (CICC) released a call to action document intended to equip state, local, tribal, and territorial (SLTT) law enforcement partners with useful tools to investigate cybercrimes and train appropriate agency personnel to tackle cybercrime issues.

Source: PM-ISE

Global Releases Reference Service Standard: Offender Tracking Record Transfer Service Specification

April 1, 2016

The Bureau of Justice Assistance (BJA)—in response to recommendations from the Global Justice Information Sharing Initiative (Global), a Federal Advisory Committee (FAC) to the U.S. Attorney General on justice information sharing, together with support from the Global Standards Council (GSC)—is pleased to announce that the following Global standard have been released and is available for download.

Offender Tracking Record Transfer Service: Offender tracking systems generate vast amounts of data; however, community corrections agencies that operate offender tracking programs report that it is often difficult to share this data. This problem is most clearly manifested in cases where an agency is ending its contractual relationship with one offender tracking provider and moving to another. Agencies have expressed a desire to automatically transfer as much information as possible (e.g. demographic data, location data, violation and alert data) from a previous provider to populate the data fields of the new providers software. This capability would allow the retention of important historical data and streamline the client re-enrollment process. This project was an effort to develop the models and technical components, in the form of a service specification, specific to the transfer of offender tracking information between systems. The goal of this project was to develop a Global Reference Architecture (GRA) Service Specification Package (SSP) for the transfer of offender tracking information (offender tracking record) from one offender tracking system to another. Further, it is envisioned that this SSP could provide a foundation for future information exchange initiatives between multiple criminal justice agencies and the various offender tracking system providers that operate in this country. The capability for automated information sharing across jurisdictions and provider software platforms would greatly enhance public safety.

The Offender Tracking Record Transfer Service—along with all of the Global information sharing standards, deliverables, and tools for the justice community— can be found through the Global Information Sharing Toolkit (GIST).

Source: GLOBAL