11/26/2013 - Civil liberties groups joined together to produce this report on the repression and criminalization of protest activities. The report explores how some law enforcement agencies are using aggressive tactics in dealing with peaceful protesters.
10/25/2013 - A look at security clearance issues in light of recent security problems; also, a progress report on the push to change the criteria that determine when a person can be held liable or convicted for not complying with the law.
09/30/2013 - Kentucky has become the third state to require that students be read their Miranda rights before being questioned by a principal or school administrator if a law enforcement officer or school resource officer is present.
09/30/2013 - There are two ways to look at this book. It might be viewed as an informative and well-researched look at internal affairs (IA) units inside law enforcement agencies. Or it could be seen as a template for how to conduct internal investigations—it’s this latter view that might serve security professionals.
09/30/2013 - From its first word, Gang Injunctions and Abatement comes across as little more than a sales pitch. While written from a law enforcement and psychological perspective, it is presumptuous, limited in scope, and fails to consider other perspectives in an effort to convince the reader to believe in gang injunctions and abatement, court actions that aim to limit and modify gang behavior.
09/30/2013 - A public-safety broadband network starts to get off the ground; the government releases a report on Hurricane Sandy response; and researchers discuss a new technique to find missed fingerprints at crime scenes.
09/04/2013 - For many years, we have been led to believe, by the law enforcement community and daytime reality shows, that the polygraph test is a very reliable “investigatory tool” to measure someone’s honesty. Author Doug Williams dispels some of those misconceptions in his book From Cop to Crusader.
08/28/2013 - The Cloud Security Alliance has created a new working group to focus on the examination of incident handling and forensics in the cloud environment. In its first white paper, Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing, the group aims to help practitioners define standardized processes for conducting forensic investigations.