Is this e-mail not displaying correctly? View it in your browser.
Bureau of Justice Assistance, U.S. Department of Justice; Global Justice Information Sharing Initiative; Five in 5—Criminal Intelligence Coordinating Council

The Criminal Intelligence Coordinating Council’s (CICC) Five in 5 is a snapshot of law enforcement and criminal intelligence-related articles, resources, and research that may be of interest to CICC members and partners working to improve the nation’s ability to develop and share criminal intelligence. 

The CICC’s mission—to advocate for and support state, local, and tribal law enforcement and homeland security agencies and personnel in their efforts to develop and share criminal intelligence for the promotion of public safety and the security of our nation—is important, contemporary, and essential.  Five in 5 is provided for your information and awareness as an effort to assist the criminal intelligence community in understanding trends, training, and activities that may impact law enforcement and criminal intelligence.  You are encouraged to share this e-mail with your association members, colleagues, department/organization personnel, and others, as appropriate. Please contact cicc@iir.com to submit an article for consideration in the CICC’s Five in 5.

 
 
1. Video Surveillance

How to Survive the Surveillance Video Data Flood

The surveillance market is witnessing explosive growth as the public sector is capturing higher-quality data from drones, in-car video, surveillance video, body cameras, digital content, and other new sources.  In addition, the length of time evidentiary video needs to be kept has greatly increased.  Traditional storage architecture methods used by public sector agencies has not kept up with the changing landscape of retention policies.  An enterprise approach allows organizations to look across all the applications and create a “public safety data lake” to store and manage all of the evidence and video data on a common infrastructure.

The article is available at https://gcn.com/articles/2016/04/15/surveillance-data.aspx.

 
 
2. Child Exploitation Investigation

ICE Participates in Europol-Led Effort to Identify Victims of Child Abuse

Victim identification specialists from the U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations have been working with top experts from around the globe at Europol’s headquarters in The Hague, Netherlands, to work unsolved cases in an effort to identify victims of child sexual abuse and exploitation.  The coordinated effort of this Europol Victim Identification Task Force has yielded significant results.  In addition, Europol has distributed intelligence packages to several countries to assist in the identification of victims.

The article is available at https://www.ice.gov/news/releases/ice-participates-europol-led-effort-identify-victims-child-abuse.

 
 
3. Fusion Center

TBI Offers Behind the Scenes Look on Media Day

The Tennessee Bureau of Investigation (TBI) hosted members of the media for a rare look behind the scenes on April 22.  Statewide law enforcement have always experienced challenges in sharing information rapidly, so in 2007, the TBI opened a fusion center and partnered with several state and federal partners.  The TBI now has three portable fusion centers that can be set up anywhere in the state and have access to internal files, in addition to a fleet of violent crime response trucks.  These capabilities are utilized by the TBI to assist local law enforcement out in the field.

The article is available at http://www.wbrc.com/story/31796674/tbi-offers-behind-the-scenes-look-on-media-day.

 
 
4. Information Sharing

Pittsburgh Seeks Help to Improve Law Enforcement Collaboration

Regional law enforcement is operating on a limited budget to share information about potential homegrown terrorists and could benefit from federal help to implement high-tech investigation tools.  The Pittsburgh, Pennsylvania, Police Department chief stated that the region’s splintered municipal makeup cripples their ability to share information among police departments, and officials hope to establish centers for intelligence sharing and public safety training.

The article is available at http://triblive.com/news/allegheny/10314194-74/enforcement-law-pittsburgh.

 
 
5. Cyber

Users Are Patching Windows, But QuickTime and Java Vulnerabilities Remain

Software vulnerabilities on personal computers running Microsoft Windows should prompt users to patch all their software and uninstall both Apple QuickTime and Oracle Java.  Users may think their PCs are secure because they are running Windows Update, but most are still at risk because of vulnerabilities against outside attacks—most notably Apple's QuickTime and iTunes, Oracle Java JRE, and Adobe Reader.

The article is available at http://www.zdnet.com/article/users-are-patching-windows-but-quicktime-and-java-vulnerabilities-remain-says-secunia

Cyber resources are available at www.iacpcybercenter.org.