INFORMATION

Site Map - Law Enforcement

Managing the Use of Force Incident: For Criminal Justice Officers, Supervisors, and Administrators

- The subtitle of this book refers to criminal justice officers, supervisors, and administrators, but the principles can also apply to security directors and managers whose officers may have to use force as part of their jobs.

Practical Methods for Legal Investigations: Concepts and Protocols in Civil and Criminal Cases

- Author Dean Beers was never a street cop, but as a county deputy coroner he learned his way around a crime scene and it shows.

Book Review: Fraud Fighter: My Fables and Foibles

- This is an autobiography of a FBI agent who found his way in life, from poor beginnings to creating a world-class organization dedicated to educating fraud fighters.

Book Review: The Four Stages of Highly Effective Crisis Management: How to Manage the Media in the Digital Age

- During a crisis situation, security professionals, corporate and public officials, and law enforcement representatives must know how best to work with the media to disseminate information to the public. Jane Jordan-Meier’s book takes up this issue in an informative and comprehensive way.

Morning Security Brief: NRF 2011 Survey, Electronic Monitoring, TSA Shakedown, and More

- The NRF says that the rise in retail crime numbers is a result of enforcement efforts and criminals becoming more desperate. Charlotte expands its electronic monitoring program. TSA fires five and suspends 38 for failing to screen passengers properly. And more.

Supreme Court Refuses to Hear Taser Case

- The U.S. Supreme Court has declined to hear a case involving police use of Tasers. In the case, a lower court ruled that police officers in two separate incidents engaged in unreasonable force when discharging their Tasers. However, because case law was not established at the time of the incidents, the officers were not necessarily aware of this fact. Therefore, they were protected from liability.

Morning Security Brief: DNA Previously Collected Leads to Arrest, Electronic Control Weapons, Countering al Qaeda Ads, and More

- DNA from a prior arrest links a man to a girl missing since March. Americans for Effective Law Enforcement builds a database of electronic control weapons research. How the State Department is countering al Qaeda online. And more.

LAPD Agrees to Suspicious Activity Reporting Reforms

- The Los Angeles Police Department has agreed to amend its suspicious activity reporting program after civil liberties and community groups raised civil concerns.

Mission-Based Policing

- The authors of Mission-Based Policing have developed an interesting approach to urban policing in high-crime areas. The counterinsurgency paradigm advanced by Lt. General David H. Petra­eus and Lt. General James F. Amos is the impetus of their mission-based policing.

Social Engineering, the Art of Human Hacking

- This is a comprehensive survey of social engineering concepts, techniques, and frameworks. It is a great reference in need of better editing to sharpen it into a more readable format.

Afternoon Security Brief: Remote Viewing, The Dip Chip Tests Toxicity, NCCD Web Site Goes Live, and More

- Default passwords and remote viewing allow hackers to view surveillance footage. Researchers create a biosensor that can detect toxicity in real time. The National Council on Crime and Delinquency launches a new Web site. And more.

Morning Security Brief: TSA Breaches, Stop and Frisk, Cybersecurity Information Sharing, and More

- TSA managers not reporting half of security breaches to headquarters. The NYPD reports an increase in stop and frisk searches. The DoD is looking for contractors to participate in a cybersecurity information-sharing program. And more.

FBI Publishes Tips to Recognize the Company Mole

- The FBI says employees who leak trade secrets and other sensitive information often exhibit behaviors co-workers can pick up on to prevent such breaches.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.