INFORMATION

Site Map - Law Enforcement

Strike One for Trilogy

- If you're planning to roll out a large-scale IT project, you might want to pay heed to some lessons learned from the FBI's troubled Virtual Case File (VCF) software project. @ The testimony before Congress by Fine, Mueller, and Punaro, and the IG's report on Trilogy, are at SM Online.

A Site To See

- There is a tension between security and privacy, and since 9-11 it can be argued that public opinion has leaned more toward the former at the expense of the latter. For that reason, groups that are fighting to maintain or increase the privacy rights of citizens are more important than ever. The Center for Democracy and Technology (CDT) is a leading advocate for privacy in a technological age where fears of terrorism are cited as a rationale for government and law enforcement to have greater access to data. Over the past decade CDT has fought spyware, opposed greater use of wiretaps by the FBI on wireless phones and VoIP, and looked for a balance between protecting intellectual-property rights and allowing consumers fair use. No matter where you stand on these issues, it is helpful to understand the perspective of privacy advocates, such as the CDT.     @  You can get to the CDT’s Web site via SM Online.

A Site to See

- The Center for Democracy and Technology (CDT) is a leading advocate for privacy in a technological age where fears of terrorism are cited as a rationale for government and law enforcement to have greater access to data. Over the past decade CDT has fought spyware, opposed greater use of wiretaps by the FBI on wireless phones and VoIP, and looked for a balance between protecting intellectual-property rights and allowing consumers fair use. No matter where you stand on these issues, it is helpful to understand the perspective of privacy advocates, such as the CDT. @ You can get to the CDT's Web site via SM Online.

Should Police Respond to Alarms?

- The evidence clearly indicates that unverified response pulls resources to areas where they are not really needed.

Fingerprinting

- A bill ( S.B. 5157) that would allow state agencies to purchase different fingerprinting systems has been approved by the Washington Senate and is now pending in the House Criminal Justice and Corrections Committee. The bill would allow state agencies, including various law enforcement groups, to purchase any brand of fingerprinting system so long as the systems are interoperable. The bill would overturn a 1996 law that required all state agencies to purchase the same system. Another bill (S.B. 5553), which would require fingerprint background checks for purposes not related to criminal activity to be submitted electronically, has been approved by the Senate Health, Services, and Corrections Committee. The proposed legislation is currently awaiting action in the Washington State House Ways and Means Committee. The bill, which would have a significant effect on fingerprint background checks conducted during the hiring process, would provide $270,000 to help upgrade the current system. The proposed legislation also requires that the electronic fingerprints, such as those obtained by employers, be destroyed after the background check is complete.

Polygraphs

- Forget reliability and admissibility. Polygraph tests get results, contends one author.

Alarms.

- An Oregon appeals court has ruled that the police search of a citizen’s home in response to a false burglar alarm was illegal.State of Oregon v. Damon Lamon Stoudamire, Court of Appeals of the State of Oregon, No. CR02-0915, 2005)

Terrorist tactics

- “Coordinated Terrorist Attacks: Implications for Local Responders,” an article in a recent FBI Law Enforcement Bulletin, explores these types of attacks and provides advice for first responders. The prospect of coordinated attacks makes it advisable for responders to decentralize equipment and personnel, say authors Brian K. Houghton and Jonathan M. Schacter. Further, responders should avoid deploying all their resources after an attack, lest they be targeted by a secondary attack or be needed elsewhere. Responders should also anticipate being attacked, say the authors, and work with law enforcement to establish a secure perimeter far from the site of the first attack, to sweep for secondary devices, and to monitor bystanders who may be witnesses or terrorists themselves.

Financial crimes

- An FBI report looks at  trends in mortgage  fraud and other financial crimes.

Did You Know That?

- On a single day during the summer, the FBI and law enforcement from 10 other countries conducted more than 90 searches around the world to crack down on illegal trade and distribution in software, games, movies, and music on the Internet. Investigators seized more than $50 million of pirated works during the raid, part of Operation Site Down.

Quarterbacking the Super Bowl

- Keeping dozens of law enforcement and safety agencies communicating before and during the game was part of the security challenge faced by the Jacksonville Sheriff’s Office.

Building Blocks for Future Intelligence

- When Maryland State Police pulled over Ziad S. Jarrah for a traffic stop two days before he and 18 other terrorists commandeered and crashed  four aircraft on September 11, 2001, tragically the officer on the scene had no way of knowing that Jarrah was on a CIA watch list

Patriot Act

- Before adjourning for the August recess, the House and Senate approved different bills renewing the Patriot Act. The House measure (H.R. 3199) would make permanent most of the expiring law enforcement provisions, and it would extend for ten years two controversial items—seizure of personal records, such as those held by libraries, and roving wiretaps. The Senate version of the bill (S. 1266) would also make permanent most of the provisions but would extend the two controversial provisions for only four years. In addition, the Senate legislation, which is preferred by civil rights advocates, would allow people to challenge warrants issued by secret courts and would require that those targeted be notified within seven days unless a judge grants an extension. When Congress returns in September, a House and Senate conference committee will try to draw up a compromise bill that resolves the differences.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.