INFORMATION

Site Map - Law Enforcement

Digging Through Digital Data

- The history and basics of computer forensics are laid out in "Computer Forensics: Characteristics and Preservation of Digital Evidence," an article by FBI computer forensic examiner Loren D. Mercer in a recent issue of the FBI Law Enforcement Bulletin.

Interviews.

- Statement analysis can help interviewers ask the right questions.

A Law Enforcement and Security Officers' Guide to Responding to Bomb Threats:

-  Security professionals sometimes forget just how little they knew when they began their careers and how valuable they found references that successfully covered the basics. This book, by a captain in the Dothan (Alabama) Police Department, is a good example of such a book.

Quick Bytes: Trilogy trips up

- The FBI's efforts to modernize its IT program--an effort known as Trilogy--"is not currently on a path to success." That assessment comes from a new book by the National Research Council of the National Academies, which concludes in part that the FBI has no contingency plan in case its new Virtual Case File application fails.

CD-Based Security Resources

- A new CD-based training tool, Securing Law Enforcement Computer Systems, is now available from the National White Collar Crime Center (NW3C).

A Drooping Spam Law

- The CAN-SPAM law was a flaccid defense against unwanted e-mail, according to antispam company Commtouch, which analyzed hundreds of millions of spam messages in the first half of this year.

Quick Bytes: Trilogy trips up.

- The FBI's efforts to modernize its IT program--an effort known as Trilogy--"is not currently on a path to success." That assessment comes from a new book by the National Research Council of the National Academies, which concludes in part that the FBI has no contingency plan in case its new Virtual Case File application fails. The book also says that a gap remains between "IT and a coherent view of the bureau's mission and operational needs," which can only be closed with close involvement by the FBI's senior leadership. @ A Review of the FBI's Trilogy Information Technology Modernization Plan is available in PDF format.

CD-Based Security Resources

- A new CD-based training tool, Securing Law Enforcement Computer Systems, is now available from the National White Collar Crime Center (NW3C). The CD is available at the NW3C's Web site, www.nw3c.org.

Surveillance

- The FBI Law Enforcement Bulletin lays out the finer points of surveillance.

Tracking the Cybercrime Trail

- In addition to knowing how to follow the bits of evidence, forensic detectives must know how to work with law enforcement.

An Island of Protection

- Find out how the Secret Service worked with multiple law enforcement groups to protect the heads of state at the G-8 Summit in Georgia.

Aviation security

- Several bills currently under consideration in Congress are aimed at enhancing aviation security programs. One bill (H.R. 3959) introduced by Rep. Frank LoBiondo (R-NJ) would authorize the Homeland Security Department to provide air marshal training to law enforcement personnel from foreign countries. The bill has no cosponsors and has been referred to the House Transportation and Infrastructure Committee. Companion bills (H.R. 4126 and S. 2268) introduced by Rep. Joe Wilson (R-SC) and Sen. Jim Bunning (R-NY), respectively, would alter the federal flight deck officer program--allowing pilots to carry firearms on commercial flights. The measure would add mental health standards and firearms training to the list of eligibility requirements. The bill would also prohibit the disclosure of information relating to a pilot's participation in the program and provide an appeal process for pilots who have been determined ineligible for the program.

Concealed weapons.

- A bill (H.R. 218) that would exempt off-duty and retired law enforcement personnel from compliance with concealed-weapons laws has been approved by both houses of Congress.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.